Cisco Talos researchers have uncovered a new campaign by China-linked threat actor UAT-8099, active between late 2025 and early 2026, targeting vulnerable Internet Information Services (IIS) servers across Asia—particularly in Thailand and Vietnam.
Campaign Overview
- Threat Actor: UAT-8099 (China-linked).
- Targets: IIS servers in India, Pakistan, Thailand, Vietnam, Japan (with concentration in Thailand & Vietnam).
- Initial Access: Exploiting IIS vulnerabilities or weak file upload settings.
- Persistence: Hidden accounts (
admin$, fallbackmysql$) created to maintain access. - Tools Used:
- Web shells & PowerShell for execution.
- GotoHTTP for remote control.
- SoftEther VPN & EasyTier for covert access.
- Sharp4RemoveLog (clear event logs).
- CnCrypt Protect (hide malicious files).
- OpenArk64 (terminate security processes).
BadIIS Malware Variants
- BadIIS IISHijack – Targets victims in Vietnam.
- BadIIS asdSearchEngine – Targets Thailand or Thai-language users.
- Core Functionality:
- Scans incoming IIS requests.
- If crawler → redirect to SEO fraud site.
- If user with Thai language header → inject malicious JavaScript redirect.
Three distinct variants in asdSearchEngine cluster:
- Exclusive multiple extensions variant – Avoids resource-heavy/static file types.
- Load HTML templates variant – Dynamically generates SEO content using templates/randomized data.
- Dynamic page extension/directory index variant – Focuses injections on dynamic pages (e.g.,
default.aspx,index.php) for maximum SEO poisoning impact.
Evolution of Tactics
- Shift from broad SEO fraud to regional targeting (Thailand & Vietnam).
- Increased use of red team utilities and legitimate tools to evade detection.
- GotoHTTP launched via VBScript + PowerShell for stealthy remote control.
- Development of Linux BadIIS variant (ELF binary) with proxy, injector, and SEO fraud modes—targeting only Google, Bing, Yahoo crawlers.
Strategic Impact
- SEO poisoning: Redirects search engine crawlers to fraudulent sites, boosting malicious domains.
- Stealth: Avoids static file injections to reduce suspicious error logs.
- Persistence: Multiple hidden accounts ensure long-term access.
- Cross-platform expansion: Refinement of Linux variant shows intent to broaden attack surface.
Defensive Recommendations
- Patch IIS vulnerabilities and harden file upload settings.
- Audit accounts: Look for hidden accounts (
admin$,mysql$). - Monitor logs: Detect event log tampering and suspicious PowerShell activity.
- Network controls: Restrict external access to IIS servers, enforce VPN monitoring.
- Threat hunting: Watch for SEO poisoning indicators (unexpected redirects, injected JavaScript).
Takeaway
UAT-8099’s BadIIS campaign demonstrates how state-linked actors weaponize IIS servers for SEO fraud and covert persistence. By evolving tactics—regional targeting, hidden accounts, and Linux variants—the group is refining its ability to blend cybercrime with espionage-style persistence. Organizations in Asia, especially Thailand and Vietnam, must prioritize patching, monitoring, and account auditing to defend against this ongoing threat.
Leave a Reply