CraneFly Unleashes Novel IIS Attack

Share This Post

Researchers at Symantec have discovered and documented a previously unknown dropper called Geppei. This dropper trojan is being used to install backdoors like Dunfuan and Regeorg on load balancers, wireless access point controllers, and SAN arrays.

What makes this attack so unique is the method of commanding the dropper. The developers, a hacking group Symantec refers to as Cranefly, are using the hosting server’s legitimate IIS logs to communicate with Geppei. The attackers send commands to a compromised web server by disguising them as web access requests. IIS records these requests in its log file, as normal, but Geppei can then read that log file and interpret these requests as commands; commands which often contain malicious, encoded .ashx files to be used as backdoors for attackers.

An in-depth breakdown of how this trojan dropper operates, as well as a list of identified Indicators of Compromise in attacks using Geppei, can be found in Symantec’s original article: https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/cranefly-new-tools-technique-geppei-danfuan



Reach out to our incident response team for help

More To Explore

Information Security News – 5/12/2025

Microsoft Sets Passkeys Default for New Accounts Article Link: https://thehackernews.com/2025/05/microsoft-sets-passkeys-default-for-new.html Accenture: What We Learned When Our CEO Got Deepfaked Article Link: https://www.computing.co.uk/event/2025/accenture-what-we-learned-when-our-ceo-got-deepfaked Ghost Students Creating

Information Security News – 5/5/2025

Cloudflare Sees a Big Jump in DDoS Attacks Article Link: https://www.bleepingcomputer.com/news/security/cloudflare-mitigates-record-number-of-ddos-attacks-in-2025/ Bring Your Own Computer Trend Gives Cyber Pros Chills, Yet It’s Here to Stay

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.