Cybersecurity researchers at Positive Technologies have discovered silent JavaScript keyloggers embedded in the Outlook on the Web (OWA) login pages of compromised Microsoft Exchange servers.
According to HelpNet Security, on June 17, cybersecurity researchers at Positive Technologies discovered that unknown threat actors had secretly injected JavaScript keyloggers into the Outlook on the Web (OWA) login page of compromised Microsoft Exchange servers. These infected servers belong to government agencies and private organizations across Asia, Europe, Africa, the Middle East, and Australia, including Vietnam, Russia, Taiwan, China, and more.
While some servers were already vulnerable to known exploits, like ProxyLogon (CVE‑2021‑26855), ProxyShell (three CVEs in 2021), and SMBGhost (CVE‑2020‑0796), others had no known vulnerabilities, suggesting that the attackers used alternative methods to gain access. Once inside, attackers added either:
The malicious code was invisible to legitimate users during login, making detection extremely difficult.
Positive Technologies developed and shared a custom YARA rule to help organizations detect malicious JavaScript keyloggers injected into Outlook on the Web (OWA) login pages. This rule is specifically tailored to identify suspicious patterns that match the behavior and structure of the injected scripts.
How to use it:
Additional signs of compromise:
Proactive scanning using YARA rules like this can significantly improve detection and reduce dwell time before attackers exploit stolen credentials.
According to HelpNet Security, Positive Technologies’ report focuses on the global spread, stating, “The majority of compromised servers were found in government organizations (22 servers belonging to government entities), as well as in the IT, industrial, and logistics companies.” They stressed that the delivery method remains unclear, urging organizations to scan all authentication pages and directories linked to Exchange servers for suspicious or modified JavaScript. The researchers even provided YARA rules to facilitate detection.
This attack goes beyond simple malware infections. It compromises trust in enterprise email systems by:
The scope, covertness, and specificity of these attacks make them a potent threat in both cybersecurity and geopolitical contexts.
See also: HIPAA Compliant Email: The Definitive Guide (2025 Update)
A YARA rule is a pattern-matching script used to detect malware or suspicious behavior. The rule shared by researchers identifies the specific JavaScript patterns used by the keyloggers.
Beyond patching, organizations should adopt regular code reviews, endpoint monitoring, threat hunting, and apply least-privilege access controls. Proactive scanning and behavioral analytics are essential to detect stealthy threats like this.