Search
  • For Individuals
      « Back
    • Windows Data Recovery

      Recovers lost or deleted Office documents, emails, presentations & multimedia files.

      Free Standard Professional Premium

    • Mac Data Recovery

      Recovers deleted files, photos, videos etc. on Mac.

      Free Standard Professional Premium

    • Photo Recovery

      Recover photos, videos, & audio files from all cameras and storage on Windows or Mac.

      Free Standard Professional Premium

    • Video Repair
    • Photo Repair
    • iPhone Data Recovery
  • For Business
      « Back
    • Email Repair & Converter

      Repair for Exchange Converter for EDB Converter for OST Converter for NSF Converter for OST MBOX Repair for Outlook

    • Database & File Repair

      Repair for MS SQL Repair for Access Repair for QuickBooks Software Repair for Excel Extractor for Windows Backup Repair for MySQL

    • Data Recovery & Erasure

      Data Recovery Professional Data Recovery Technician Mac Recovery for Technician Virtual Machine Recovery File Erasure Software Mobile Erasure Drive Erasure File Eraser Software File Eraser Software for Mac

    • Toolkit

      Exchange Toolkit Outlook Toolkit File Repair Toolkit MS SQL Toolkit Data Recovery Toolkit

    • Forensic

      Email Forensic Exchange Auditor Log Analyzer for MySQL Log Analyzer for MS SQL

  • Store
  • Partners
  • Services
  • Offers
  • Support

 

  • For Individuals
    DIY software for anyone who works with data.

    Windows Data Recovery Recovers lost or deleted Office documents, emails, presentations & multimedia files

    Free Standard Professional Premium

    Mac Data Recovery Especially for Mac users to recover deleted documents and multimedia files from macOS

    Free Standard Professional Premium

    Video Repair Windows Mac Repair multiple corrupt videos in one go. Supports MP4, MOV & other formats.

    StandardPremium

    Photo Recovery Windows Mac Recover photos, videos, & audio files from all cameras and storage on Windows or Mac.

    Standard Professional Premium

    iPhone Data Recovery Windows Mac Recover deleted photos, videos, contacts, messages etc. directly from iPhone & iPad

    Recover Erase Toolkit

    Photo Repair Windows Mac Repair multiple corrupt photos in one go. Supports JPEG & other formats.

    Standard Professional Premium


  • For Business
    • Email Repair
    • Email Converter
    • File Repair
    • Data Recovery & Erasure
    • Toolkit
    • Forensic

    Exchange Repair Repair corrupt EDB file & export mailboxes to Live Exchange or Office 365

    Outlook PST Repair Repair corrupt PST & recover all mailbox items including deleted emails & contacts

    OLM Repair Repair Outlook for Mac (OLM) 2011 & 2016 backup files & recover all mailbox items

    Exchange Toolkit Repair EDB & Exchange backup file to restore mailboxes, convert OST to PST, & convert EDB to PST

    Active Directory Repair Repair corrupt Active Directory database (Ntds.dit file) & extract all objects in original form

    EDB to PST Convert online & offline EDB file & extract all mailbox items including Public Folders in PST

    OST to PST Convert inaccessible OST file & extract all mailbox items including deleted emails in PST

    NSF to PST Convert IBM Notes NSF file & export all mailbox items including emails & attachments to PST

    MBOX to PST Convert MBOX file of Thunderbird, Entourage & other clients, & export mailbox data to PST

    OLM to PST Convert Outlook for Mac Data File (OLM) & export all mailbox data to PST in original form

    GroupWise to PST Convert GroupWise mail & export all mailbox items - emails, attachments, etc. - to PST

    EML to PST Convert Windows Live Mail (EML) file & export mailbox data - emails, attachments, etc. - to PST

    Office 365 to PST Connect to Office 365 account & export mailbox data to PST and various other formats

    DBX to PST Convert Outlook Express (DBX) file & export all mailbox data - emails, attachments, etc. - to PST

    SQL Repair Repair corrupt .mdf & .ndf files and recover all database components in original form

    Access Repair Repair corrupt .ACCDB and .MDB files & recover all records & objects in a new database

    QuickBooks Repair Repair corrupt QuickBooks® data file & recover all file components in original form

    MySQL Repair Repair MyISAM & InnoDB tables and recover all objects - keys, views, tables, triggers, etc.

    Excel Repair Repair corrupt Excel (.XLS & .XLSX) files and recover tables, charts, chart sheet, etc.

    BKF Repair Repair corrupt backup (BKF, ZIP, VHDX and .FD) files and restore complete data

    Database Converter Interconvert MS SQL, MySQL, SQLite, and SQL Anywhere database files

    PowerPoint Repair Repair corrupt PPT files and restore tables, header, footer, & charts, etc. like new

    File Repair Toolkit Repair corrupt Excel, PowerPoint, Word & PDF files & restore data to original form

    Data Recovery Windows Mac Recover lost or deleted data from HDD, SSD, external USB drive, RAID & more.

    Technician Toolkit

    Tape Data Recovery Retrives data from all types and capacities of tape drives including LTO 1, LTO 2, LTO 3, & others.

    Virtual Machine Recovery Recover documents, multimedia files, and database files from any virtual machine

    File Erasure Permanently wipe files and folders, and erase traces of apps and Internet activity.

    Standard Corporate

    Mobile Erasure Certified and permanent data erasure software for iPhones, iPads, & Android devices

    Drive Erasure Certified and permanent data erasure software for HDD, SSD, & other storage media Windows Mac

    Exchange Toolkit 5-in-1 software toolkit to recover Exchange database, convert EDB to PST, convert OST to PST, restore Exchange backup, and reset Windows Server password.

    Outlook Toolkit Comprehensive software suite to repair PST files, merge PST files, eliminate duplicate emails, compact PST files, and recover lost or forgotten Outlook passwords.

    File Repair Toolkit Powerful file repair utility to fix corrupt Word, PowerPoint, and Excel documents created in Microsoft Office. It also repairs corrupt PDF files and recovers all objects.

    MS SQL Toolkit 5-in-1 software toolkit to repair corrupt SQL database, restore database from corrupt backup, reset database password, analyze SQL logs, & interconvert databases.

    Data Recovery Toolkit Software helps to recovers deleted data from Windows, Mac and Linux storage devices. Also supports recovery from RAIDs & Virtual Drives.

    Email Forensic Advanced email forensic solution for cyber experts to audit, analyze, or investigate emails & gather evidences.

    Exchange Auditor Exchange Server monitoring solution to automate audits, scans and generate reports ìn real-time.

    Log Analyzer for MySQL Analyze forensic details of MySQL server database log files such as Redo, General Query, and Binary Log.

    Log Analyzer for MS SQL Track & analyze MS SQL Server database transactions log files.

    STELLAR EMAIL FORENSIC

    Advanced email forensic tool to analyze and collect the mailbox data of email clients

    Learn More arrow


    All Products

    All Products

    All Products

    All Products

  • Our Partners
  • Lab Services
  • Trending Searches

    Data Recovery

    Photo Recovery

    Video Repair

    iPhone Data Recovery

    File Erasure Software

    Exchange Repair

    OST to PST

    PST Repair

    Raid Recovery

    MS SQL Repair

  • English Deutsch Français Nederlands Italiano Español 日本語 简体中文
  • Support
Exchange Server 3 minute read

Hackers Deploy IceApple Post-Exploitation Framework on Hacked Exchange Servers

Published on May 16th, 2022
Ravi Singh
Written By
Ravi Singh
Shaun Hardneck
Approved By
Shaun Hardneck

Summary: Cybersecurity experts have recently identified a new post-exploitation framework, IceApple, which adversaries are using to harvest credentials and deploy malware on compromised Exchange Servers. In this blog, we have discussed the IceApple framework in detail and the ways on how to protect your Exchange Server from such threats.

Hackers Deploy IceApple Post-Exploitation Framework on Hacked Exchange Servers

IceApple is a novel Internet Information Services (IIS) .NET-based post-exploitation framework deployed on Microsoft Exchange Servers for surveillance and stealing or encrypting the business data. Hackers use it on compromised Microsoft Exchange Servers to harvest credentials from OWA servers, local or remote host registries, and data exfiltration.

First uncovered by the CrowdStrike cybersecurity firm back in late 2021, the IceApple framework has been observed on multiple Exchange Servers located in geographically different areas. Additionally, it targeted a wide range of sectors, such as academics, technology, etc.

Once again, the emergence of a new and improved IceApple post-exploitation framework indicates active development and deployments.

Contents

  • How IceApple Evades Detection on Exchange Servers?
  • How to Protect Your Exchange Organization from IceApple?
  • To Wrap Up

How IceApple Evades Detection on Exchange Servers?

IceApple uses an in-memory framework to maintain a low forensic footprint on the infected host and uses a number of features to evade detection. The analysis of IceApple suggests that the module is developed by adversaries with deep insights and experience of the inner workings of Internet Information Services (IIS).

tasking deserialization and processing flowchart

Figure 1: Tasking deserialization and processing flowchart (Source: CrowdStrike)

Until now, intrusions observed on Microsoft Exchange Servers involved malware being loaded to steal or encrypt information. However, IceApple can run under any Internet Information Service (IIS) web app. Moreover, it can install malicious components to establish persistence under IIS, providing a mechanism to extend the web servers’ functionality. It also blends into the compromised server by generating assembly files that appear to be generated by the IIS web server, making the IceApple a potent threat.

According to OverWatch — a CrowdStrike’s managed threat hunting service:

“At its core, IceApple is a post-exploitation framework focused on increasing an adversary’s visibility of a target through the acquisition of credentials and exfiltration of data. None of the modules observed by OverWatch provides exploitation or lateral movement capabilities.”

How to Protect Your Exchange Organization from IceApple?

Currently, the best defense is to safeguard your Exchange environment, especially the web applications, from malicious access. Thus, it’s important to identify the Exchange security challenges to strengthen your baseline security and fully patch all applications and servers to prevent IceApple from infiltrating your Exchange organization.

Follow our guide on installing the latest Security and Cumulative Updates to protect Exchange Servers from malicious attacks.

Also, use technology to identify and prevent known threats and emerging threats proactively. For example, here are some best Exchange security practices in 2022 you must follow to fortify server security.   

To Wrap Up

IceApple is a highly advanced and sophisticated post-exploitation framework, which isn’t easy to detect. To safeguard your Exchange organization from IceApple, you must update and patch the applications, including your Exchange environment with the latest Security Updates. To stay updated on the latest Security and Cumulative Update releases, you can follow our blog on Exchange vulnerabilities, flaws, and fixes.

However, if you suspect that the server is compromised, you should set up a new Exchange Server and stop using the compromised one. You can use your backup to restore mailboxes or install an Exchange recovery software, such as Stellar Repair for Exchange, to extract mailboxes from the database files on the compromised Exchange Server and export them directly to the newly set up server. The software comes in handy when backups are not available. It can repair damaged or corrupt databases, and thus, you can use it if the database doesn’t mount due to inconsistencies or corruption caused by the malicious attacks.

About The Author

Ravi Singh

Ravi Singh is a Senior Writer at Stellar®. He is an expert Tech Explainer, IoT enthusiast, and a passionate nerd with over 6 years of experience in technical writing. He writes about Data Recovery, File Repair, Email Migration, Linux, Windows, Mac, and DIY Tech. Ravi spends most of his weekends working with IoT devices and playing games on the Xbox. He is also a solo traveler who loves hiking and exploring new trails.

Best Selling Products

Stellar Repair for Exchange

Software recommended by MVPs & Administr

Read More

Stellar Toolkit for Exchange

5-in-1 suite of specialized tools, highl

Read More

Stellar Converter for EDB

Stellar Converter for EDB is a professio

Read More

Stellar Converter for OST

Powerful software trusted by Microsoft M

Read More

Leave a comment Cancel reply

Your email address will not be published. Required fields are marked *

  +  88  =  97

Table of Contents    

  1. How IceApple Evades Detection on Exchange Servers?
  2. How to Protect Your Exchange Organization from IceApple?
  3. To Wrap Up

Categories

Related Posts

How to Rebuild Exchange Search Index
Exchange Server

How to Rebuild Exchange Search Index?

Stellar Author Ravi Singh May 19, 2022 Read More
Hive Ransomware Affiliate Targeting Microsoft Exchange Servers
Exchange Server

Hive Ransomware Affiliate Targeting Microsoft Exchange Servers

Stellar Author Ravi Singh April 25, 2022 Read More
How to Disable Circular Logging in Exchange Server
Exchange Server

How to Disable Circular Logging in Exchange Server

Stellar Author Ravi Singh April 22, 2022 Read More

Stellar Official Website

Stellar Data Recovery Inc.
48 Bridge Street Metuchen,
New Jersey 08840,
United States

ALSO AVAILABLE AT

About

  • About us
  • Career
  • ISMS Policy
  • Privacy Policy
  • Terms of Use
  • License Policy
  • Refund Policy
  • End User License Agreement

RESOURCES

  • Blog
  • Articles
  • Product Videos
  • Knowledge Base
  • Case Studies
  • Whitepapers
  • Software Catalog

NEWS & EVENTS

  • News
  • Events

PARTNERS

  • Affiliates
  • Resellers
  • Distributors

Useful Links

  • Contact Us
  • Support
  • Special Offers
  • Student Discounts
  • Awards & Reviews
  • Downloads
  • Store
  • Sitemap
Follow Us

Stellar & Stellar Data Recovery are Registered Trademarks of Stellar Information Technology Pvt. Ltd. © Copyright 2022 Stellar Information Technology Pvt. Ltd. All Trademarks Acknowledged.

DMCA.com Protection Status
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device Read More Got it!