Hackers use Microsoft IIS web server logs to control malware Hackers use Microsoft IIS web server logs to control malware (bleepingcomputer.com)