Tag Archives: post-exploitation

Researchers unearth Windows backdoor that’s unusually stealthy

reader comments 12 with Share this story Researchers have discovered a clever piece of malware that stealthily exfiltrates data and executes malicious code from Windows systems by abusing a feature in Microsoft Internet Information Services (IIS). IIS is a general-purpose web server that runs on Windows devices. As a web server, it accepts requests from… Read More »