511,000+ End-of-Life Microsoft IIS Instances Exposed Online

Related

New Data Leak Site Uncovered Linked to Active Initial Access Broker

What happened Researchers uncovered a new Tor-based data leak site...

Trio-Tech Discloses Ransomware Attack Impacting Semiconductor Operations

What happened Trio-Tech International disclosed a ransomware attack affecting its...

Kaplan Data Breach Notification Follows Hack Exposing Personal Information

What happened Kaplan North America began notifying individuals of a...

Female Cybersecurity Leaders to Watch in Virginia

Virginia’s cybersecurity bench is shaped by a rare mix...

Hacker Breaches Resolv DeFi Platform, Steals $24.5 Million in Crypto

What happened A cyberattack on decentralized finance platform Resolv allowed...

Share

What happened

Security researchers identified over 511,000 publicly exposed Microsoft Internet Information Services (IIS) servers running end-of-life software that no longer receives security updates, significantly expanding the global attack surface. The findings, based on large-scale internet scans conducted by the Shadowserver Foundation, show that many of these systems are tied to outdated Windows environments, with nearly half having already surpassed even extended security support periods. Because IIS follows the lifecycle of the underlying Windows OS, these servers are likely running unsupported operating systems as well, making them highly susceptible to exploitation by attackers targeting known vulnerabilities. Researchers warned that such systems are effectively “sitting ducks” for cybercriminals, who routinely scan for and exploit unpatched web servers and edge infrastructure. 

Who is affected

Organizations worldwide operating Microsoft IIS servers on unsupported or unpatched Windows systems are affected, particularly those with internet-facing infrastructure that remains exposed. 

Why CISOs should care

End-of-life systems no longer receive security updates, making them predictable and high-value targets for attackers who can exploit known vulnerabilities at scale. 

3 practical actions

  1. Identify and replace end-of-life systems. Upgrade or decommission IIS servers running unsupported versions. 
  2. Reduce exposure of legacy infrastructure. Remove outdated servers from public internet access where possible. 
  3. Implement lifecycle management controls. Track software support timelines to prevent similar exposure risks in the future. 

For more coverage of newly disclosed security flaws and systemic exposure risks, explore our reporting under the Vulnerabilities tag.