When you log into your company’s email system when you’re working from home or on the road, do you see something like this?
That’s the login page for Outlook Web App (formerly and commonly known as Outlook Web Access or OWA).
It runs on your company’s Exchange server to give you a web-friendly way of accessing your business email when you’re out of the office, and handles all the important business of authenticating that you are who you say you are – rather than some bad guy attempting to snaffle your firm’s secrets.
It does that by checking your login details against your business’s Active Directory server.
However, researchers at security firm Cybereason are claiming in a newly-released report that they have discovered malicious hackers targeting an unnamed company in a novel fashion in order to steal their employees’ OWA usernames and passwords, and access email accounts without permission.
The DLL, which used the same name (OWAAUTH.DLL) as a legitimate part of Outlook Web App, was able to retrieve all HTTPS server requests in cleartext after they had been decrypted – grabbing the username and password of everybody who logged into the company using OWA.
The researchers report that they discovered a log file in the root directory of the server. Once decrypted, the log file revealed that some 11,000 username and password combinations had been logged from the company.
“This treasure trove essentially gave the hackers complete access to every identity and therefore every asset in the organization.”
With that information, the malicious hackers could read sensitive communications, impersonate members of staff, but more than that… with the malicious DLL in place the attackers had opened a backdoor, giving them covert access to the server.
Questions remain, of course, as to how the attackers were able to gain remote access to the OWA server to plant the malicious DLL in the first place. One has to consider the possibility that the code was placed on the server with some internal assistance.
The Cybereason report says that they have only uncovered this particular attack at one company and that it appears to have continued for “several months”.
But, in my opinion, it sounds like the kind of intrusion that would be attractive to criminals and intelligence agencies alike, keen to snoop upon the communications and activities of a targeted organisation, or to spy upon a partner or customer of an organisation that is of special interest.
Chances are that there may be more companies and organisations out there who are unaware that their Outlook Web Application has been compromised, and is spilling secrets into the hands of hackers.
Found this article interesting? Follow Graham Cluley on Twitter to read more of the exclusive content we post.