Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud
News

Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud

Team-CWDBy Team-CWDOctober 3, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A Chinese-speaking cybercrime group is hijacking trusted Internet Information Services (IIS) worldwide to run SEO scams that redirect users to shady ads and gambling sites, Cisco Talos has found.

The group, tracked as UAT-8099, exploit IIS servers that have a good reputation to manipulate search engine results for financial gain.

The compromised IIS servers redirect users to unauthorized advertisements or illegal gambling websites. 

The IIS servers affected were identified in India, Thailand, Vietnam, Canada and Brazil, targeting organizations such as universities, tech firms and telecom providers. This was based on Cisco’s file census and DNS traffic analysis.

The majority of their targets are mobile users, encompassing not only Android devices but also Apple iPhone devices.

Cisco Talos detailed the full attack chain and additional findings relating to the UAT-8099 campaign in a blog published on October 2, 2025.

The firm explained that when the group discovers a vulnerability in the target server, it uploads a web shell to collect system information and conducts reconnaissance on the host network.

Once the collection of information is complete, UAT-8099 enables the guest account, escalate its privileges to administrator level and uses this account to enable remote desktop protocol (RDP).

For persistence, the hackers combine RDP access with SoftEther VPN, EasyTier (a decentralized virtual private network tool) and the FRP reverse proxy tool.

The group then performs further privilege escalation using shared tools to gain system-level permissions and install the BadIIS malware.

To secure their foothold, they deploy defense mechanisms to prevent other threat actors from compromising the same server or disrupting their setup.

New Malware Samples Identified

Cisco Talos identified the group’s activity in April 2025 and  found several new BadIIS malware samples in the campaign.

In its analysis, Talos said the BadIIS variants used in this campaign revealed functional and URL pattern similarities to a variant previously documented in 2021.

This version however had an altered code structure and a functional workflow to evade detection by antivirus products.

Talos identified several instances of the BadIIS malware on VirusTotal this year, one cluster with very low detection and another containing simplified Chinese debug strings.  



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMalicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed
Next Article Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds
Team-CWD
  • Website

Related Posts

News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Is it time for internet services to adopt identity verification?

January 14, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.