GhostRedirector Campaign Targets Windows Servers with Rungan Backdoor and Gamshen IIS Module
Summary
Hide ▲
Show ▼
The GhostRedirector threat cluster, also known as Operation Rewrite and CL-UNK-1037, has compromised at least 65 Windows servers in Brazil, Thailand, and Vietnam, deploying the Rungan backdoor and Gamshen IIS module. The campaign, active since at least March 2025, targets various sectors and uses SEO fraud to manipulate search engine results, particularly to boost the rankings of gambling websites. The threat actor, believed to be China-aligned, employs BadIIS, a malicious native IIS module, to intercept and modify HTTP traffic, serving malicious content to site visitors. The campaign also deploys other tools for remote access, privilege escalation, and information gathering. The UAT-8099 group, similar to GhostRedirector, hijacks IIS servers to funnel mobile search engine traffic to spam advertisements and illegal gambling websites. The group targets servers in Brazil, Canada, India, Thailand, and Vietnam, using open-source web shells for initial access and privilege escalation. UAT-8099 installs the BadIIS module to intercept and manipulate HTTP traffic for SEO poisoning and malicious redirects. The attackers use BadIIS to serve SEO terms to search engine crawlers and redirect human visitors to scam websites. UAT-8099 deploys a Cobalt Strike backdoor to maintain persistent access and exfiltrate sensitive data. The group's activities are often undetected by the targeted organizations due to the stealthy nature of the attacks. Cisco Talos has detailed the full attack chain and additional findings relating to the UAT-8099 campaign, identifying several new BadIIS malware samples with altered code structures to evade detection. The group uses SoftEther VPN, EasyTier, and the FRP reverse proxy tool for persistence and deploys defense mechanisms to secure their foothold. The UAT-8099 group was first discovered in April 2025 and primarily targets mobile users, including both Android and Apple iPhone devices. The group uses the Everything tool to search for valuable data within compromised hosts. BadIIS operates in three modes: Proxy, Injector, and SEO fraud. BadIIS uses backlinking to boost website visibility and rankings.
Timeline
-
04.09.2025 20:58 7 articles · 1mo ago
GhostRedirector Campaign Compromises 65 Windows Servers with Rungan and Gamshen
The group targets organizations such as universities, tech firms, and telecom providers. The majority of targets are mobile users, including both Android and Apple iPhone devices. The group uses SoftEther VPN, EasyTier, and the FRP reverse proxy tool for persistence. Cisco Talos identified several new BadIIS malware samples in the campaign. The new BadIIS variants have an altered code structure and functional workflow to evade detection. The group deploys defense mechanisms to prevent other threat actors from compromising the same server. The UAT-8099 group was first discovered in April 2025. The group primarily targets mobile users, including both Android and Apple iPhone devices. The group uses the Everything tool to search for valuable data within compromised hosts. BadIIS operates in three modes: Proxy, Injector, and SEO fraud. BadIIS uses backlinking to boost website visibility and rankings.
Show sources
- GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module — thehackernews.com — 04.09.2025 20:58
- Chinese Hackers Game Google to Boost Gambling Sites — www.darkreading.com — 04.09.2025 23:59
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
Information Snippets
-
The GhostRedirector campaign has compromised at least 65 Windows servers.
First reported: 04.09.2025 20:582 sources, 5 articlesShow sources
- GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module — thehackernews.com — 04.09.2025 20:58
- Chinese Hackers Game Google to Boost Gambling Sites — www.darkreading.com — 04.09.2025 23:59
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The primary targets are in Brazil, Thailand, and Vietnam, with additional targets in Peru, the U.S., Canada, Finland, India, the Netherlands, the Philippines, and Singapore.
First reported: 04.09.2025 20:583 sources, 6 articlesShow sources
- GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module — thehackernews.com — 04.09.2025 20:58
- Chinese Hackers Game Google to Boost Gambling Sites — www.darkreading.com — 04.09.2025 23:59
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The campaign deploys the Rungan backdoor and Gamshen IIS module.
First reported: 04.09.2025 20:583 sources, 6 articlesShow sources
- GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module — thehackernews.com — 04.09.2025 20:58
- Chinese Hackers Game Google to Boost Gambling Sites — www.darkreading.com — 04.09.2025 23:59
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
Rungan is a C++ backdoor that executes commands on compromised servers.
First reported: 04.09.2025 20:583 sources, 6 articlesShow sources
- GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module — thehackernews.com — 04.09.2025 20:58
- Chinese Hackers Game Google to Boost Gambling Sites — www.darkreading.com — 04.09.2025 23:59
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
Gamshen is an IIS module that manipulates search engine results for SEO fraud.
First reported: 04.09.2025 20:582 sources, 5 articlesShow sources
- GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module — thehackernews.com — 04.09.2025 20:58
- Chinese Hackers Game Google to Boost Gambling Sites — www.darkreading.com — 04.09.2025 23:59
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The campaign uses SQL injection vulnerabilities to gain initial access.
First reported: 04.09.2025 20:583 sources, 6 articlesShow sources
- GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module — thehackernews.com — 04.09.2025 20:58
- Chinese Hackers Game Google to Boost Gambling Sites — www.darkreading.com — 04.09.2025 23:59
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
PowerShell scripts are used to deliver additional tools from a staging server.
First reported: 04.09.2025 20:583 sources, 6 articlesShow sources
- GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module — thehackernews.com — 04.09.2025 20:58
- Chinese Hackers Game Google to Boost Gambling Sites — www.darkreading.com — 04.09.2025 23:59
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The threat actor is believed to be China-aligned based on code strings, certificate issuance, and user passwords.
First reported: 04.09.2025 20:583 sources, 4 articlesShow sources
- GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module — thehackernews.com — 04.09.2025 20:58
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The campaign targets various sectors, including education, healthcare, insurance, transportation, technology, and retail.
First reported: 04.09.2025 20:583 sources, 6 articlesShow sources
- GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module — thehackernews.com — 04.09.2025 20:58
- Chinese Hackers Game Google to Boost Gambling Sites — www.darkreading.com — 04.09.2025 23:59
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The GhostRedirector campaign uses EfsPotato and BadPotato exploits for privilege escalation.
First reported: 04.09.2025 23:593 sources, 4 articlesShow sources
- Chinese Hackers Game Google to Boost Gambling Sites — www.darkreading.com — 04.09.2025 23:59
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
Gamshen is implemented as a native IIS component, making it hard to detect and remove.
First reported: 04.09.2025 23:593 sources, 5 articlesShow sources
- Chinese Hackers Game Google to Boost Gambling Sites — www.darkreading.com — 04.09.2025 23:59
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
Gamshen intercepts HTTP requests to affect server responses, boosting target website rankings.
First reported: 04.09.2025 23:593 sources, 5 articlesShow sources
- Chinese Hackers Game Google to Boost Gambling Sites — www.darkreading.com — 04.09.2025 23:59
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The campaign targets gambling websites to artificially boost their search rankings.
First reported: 04.09.2025 23:593 sources, 5 articlesShow sources
- Chinese Hackers Game Google to Boost Gambling Sites — www.darkreading.com — 04.09.2025 23:59
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
Microsoft has acknowledged the threat of malicious IIS extensions and their use for persistence.
First reported: 04.09.2025 23:593 sources, 5 articlesShow sources
- Chinese Hackers Game Google to Boost Gambling Sites — www.darkreading.com — 04.09.2025 23:59
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
ESET recommends using dedicated accounts, strong passwords, and multifactor authentication for IIS server administrators.
First reported: 04.09.2025 23:592 sources, 3 articlesShow sources
- Chinese Hackers Game Google to Boost Gambling Sites — www.darkreading.com — 04.09.2025 23:59
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
ESET advises ensuring native IIS modules are installed only from trusted sources and are signed by a trusted provider.
First reported: 04.09.2025 23:592 sources, 3 articlesShow sources
- Chinese Hackers Game Google to Boost Gambling Sites — www.darkreading.com — 04.09.2025 23:59
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The campaign is tracked by Palo Alto Networks Unit 42 as Operation Rewrite and CL-UNK-1037.
First reported: 23.09.2025 11:132 sources, 4 articlesShow sources
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The threat actor shares infrastructure and architectural overlaps with Group 9 and DragonRank.
First reported: 23.09.2025 11:132 sources, 4 articlesShow sources
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
BadIIS is a malicious native IIS module used for SEO poisoning.
First reported: 23.09.2025 11:133 sources, 5 articlesShow sources
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
BadIIS intercepts and modifies HTTP traffic to serve malicious content.
First reported: 23.09.2025 11:133 sources, 5 articlesShow sources
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The campaign uses three variants of BadIIS modules for SEO poisoning.
First reported: 23.09.2025 11:133 sources, 5 articlesShow sources
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The threat actor creates new local user accounts and drops web shells for persistent access.
First reported: 23.09.2025 11:133 sources, 5 articlesShow sources
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The campaign uses a reverse proxy mechanism to manipulate search engine results.
First reported: 23.09.2025 11:133 sources, 5 articlesShow sources
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The threat actor is assessed with high confidence to be Chinese-speaking based on linguistic evidence and infrastructure links.
First reported: 23.09.2025 11:133 sources, 5 articlesShow sources
- BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells — thehackernews.com — 23.09.2025 11:13
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The campaign has been active since March 2025.
First reported: 23.09.2025 13:473 sources, 4 articlesShow sources
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The campaign uses compromised servers as reverse proxies to manipulate search engine results.
First reported: 23.09.2025 13:473 sources, 4 articlesShow sources
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The campaign targets users in East and Southeast Asia.
First reported: 23.09.2025 13:473 sources, 4 articlesShow sources
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The campaign involves injecting compromised websites with keywords to improve SEO rankings.
First reported: 23.09.2025 13:473 sources, 4 articlesShow sources
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The campaign uses a two-phase attack flow involving luring search engines and trapping victims.
First reported: 23.09.2025 13:473 sources, 4 articlesShow sources
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The campaign uses custom implants tailored to manipulate search engine results and control traffic flow.
First reported: 23.09.2025 13:473 sources, 4 articlesShow sources
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The campaign exfiltrates web application source code from compromised servers.
First reported: 23.09.2025 13:473 sources, 4 articlesShow sources
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The campaign uploads BadIIS implants as DLL files to compromised web servers.
First reported: 23.09.2025 13:473 sources, 4 articlesShow sources
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The campaign's BadIIS module identifies search engine crawlers and serves poisoned content.
First reported: 23.09.2025 13:473 sources, 4 articlesShow sources
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The campaign redirects victims to scam websites upon clicking poisoned search results.
First reported: 23.09.2025 13:473 sources, 4 articlesShow sources
- SEO Poisoning Campaign Tied to Chinese Actor — www.darkreading.com — 23.09.2025 13:47
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The UAT-8099 group hijacks IIS servers to funnel mobile search engine traffic to spam advertisements and illegal gambling websites.
First reported: 03.10.2025 16:003 sources, 3 articlesShow sources
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
UAT-8099 targets servers in Brazil, Canada, India, Thailand, and Vietnam.
First reported: 03.10.2025 16:003 sources, 3 articlesShow sources
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The group uses open-source web shells for initial access and privilege escalation.
First reported: 03.10.2025 16:003 sources, 3 articlesShow sources
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
UAT-8099 installs the BadIIS module to intercept and manipulate HTTP traffic for SEO poisoning and malicious redirects.
First reported: 03.10.2025 16:003 sources, 3 articlesShow sources
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The attackers use BadIIS to serve SEO terms to search engine crawlers and redirect human visitors to scam websites.
First reported: 03.10.2025 16:003 sources, 3 articlesShow sources
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
UAT-8099 deploys a Cobalt Strike backdoor to maintain persistent access and exfiltrate sensitive data.
First reported: 03.10.2025 16:003 sources, 3 articlesShow sources
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The group's activities are often undetected by the targeted organizations due to the stealthy nature of the attacks.
First reported: 03.10.2025 16:003 sources, 3 articlesShow sources
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
UAT-8099's tactics can be used to insert malicious scripts into compromised websites, potentially leading to data theft.
First reported: 03.10.2025 16:003 sources, 3 articlesShow sources
- UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft — www.darkreading.com — 03.10.2025 16:00
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The UAT-8099 group exploits IIS servers to manipulate search engine results for financial gain.
First reported: 03.10.2025 17:592 sources, 2 articlesShow sources
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The group targets organizations such as universities, tech firms, and telecom providers.
First reported: 03.10.2025 17:592 sources, 2 articlesShow sources
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The majority of targets are mobile users, including both Android and Apple iPhone devices.
First reported: 03.10.2025 17:592 sources, 2 articlesShow sources
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The group uses SoftEther VPN, EasyTier, and the FRP reverse proxy tool for persistence.
First reported: 03.10.2025 17:592 sources, 2 articlesShow sources
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
Cisco Talos identified several new BadIIS malware samples in the campaign.
First reported: 03.10.2025 17:592 sources, 2 articlesShow sources
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The new BadIIS variants have an altered code structure and functional workflow to evade detection.
First reported: 03.10.2025 17:592 sources, 2 articlesShow sources
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The group deploys defense mechanisms to prevent other threat actors from compromising the same server.
First reported: 03.10.2025 17:592 sources, 2 articlesShow sources
- Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud — www.infosecurity-magazine.com — 03.10.2025 17:59
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The UAT-8099 group was first discovered in April 2025.
First reported: 06.10.2025 14:361 source, 1 articleShow sources
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
The group primarily targets mobile users, including both Android and Apple iPhone devices.
First reported: 06.10.2025 14:361 source, 1 articleShow sources
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
UAT-8099 uses the Everything tool to search for valuable data within compromised hosts.
First reported: 06.10.2025 14:361 source, 1 articleShow sources
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
BadIIS operates in three modes: Proxy, Injector, and SEO fraud.
First reported: 06.10.2025 14:361 source, 1 articleShow sources
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
-
BadIIS uses backlinking to boost website visibility and rankings.
First reported: 06.10.2025 14:361 source, 1 articleShow sources
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers — thehackernews.com — 06.10.2025 14:36
Similar Happenings
Phantom Taurus Targets Government and Telecommunications Organizations
Government and telecommunications organizations in Africa, the Middle East, and Asia have been targeted by a China-aligned nation-state actor known as Phantom Taurus over the past two-and-a-half years. The group focuses on espionage, targeting ministries of foreign affairs, embassies, geopolitical events, and military operations. Phantom Taurus employs custom-developed tools and techniques, including a bespoke malware suite named NET-STAR, to maintain long-term intelligence collection and obtain confidential data from targets of strategic interest to China. The group's activities coincide with major global events and regional security affairs, demonstrating stealth, persistence, and adaptability in their tactics, techniques, and procedures (TTPs). Phantom Taurus has been observed using a .NET malware suite named NET-STAR to breach IIS web servers, which operates almost entirely in memory and includes a fileless backdoor that establishes encrypted command-and-control (C2) sessions. The suite includes a backdoor named IIServerCore that accepts commands and encoded .NET payloads, enabling arbitrary code execution on compromised systems. The suite also includes two AssemblyExecuter loaders (v1 and v2) that allow dynamic loading of additional .NET malware, with v2 featuring advanced evasion techniques such as AMSI and ETW bypass. The group uses custom SQL queries to search for specific tables and keywords on compromised systems, exporting all matching results. Additionally, Phantom Taurus's operational methods are supported by other custom malware, including TunnelSpecter and SweetSpecter, which are used for email exfiltration.
Oyster Malware Distributed via Fake Microsoft Teams Installers
A new malvertising campaign uses SEO poisoning to distribute fake Microsoft Teams installers that deploy the Oyster backdoor on Windows devices. The malware provides attackers with remote access to corporate networks, enabling command execution, payload deployment, and file transfers. The campaign targets users searching for 'Teams download,' leading them to a fake site that mimics Microsoft's official download page. The malicious installer, signed with legitimate certificates, drops a DLL into the %APPDATA%\Roaming folder and creates a scheduled task for persistence. The Oyster malware, also known as Broomstick and CleanUpLoader, has been linked to multiple campaigns and ransomware operations, such as Rhysida.
Exploitation of Ivanti EPMM Vulnerabilities (CVE-2025-4427, CVE-2025-4428) Leads to Malware Deployment
Two malware strains were discovered in an organization's network after attackers exploited two zero-day vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM). The vulnerabilities, CVE-2025-4427 and CVE-2025-4428, allow for authentication bypass and remote code execution, respectively. Attackers used these flaws to gain access to the EPMM server, execute arbitrary code, and maintain persistence. The attack began around May 15, 2025, following the publication of a proof-of-concept exploit. The malware sets include loaders that enable arbitrary code execution and data exfiltration. The vulnerabilities affect Ivanti EPMM development branches 11.12.0.4, 12.3.0.1, 12.4.0.1, and 12.5.0.0 and their earlier releases. A China-nexus espionage group was leveraging the vulnerabilities since at least May 15, 2025. The threat actor targeted the /mifs/rs/api/v2/ endpoint with HTTP GET requests and used the ?format= parameter to send malicious remote commands. The malware sets include distinct loaders with the same name, and malicious listeners that allow injecting and running arbitrary code on the compromised system. The threat actor delivered the malware through separate HTTP GET requests in segmented, Base64-encoded chunks. Organizations are advised to update their EPMM instances, monitor for suspicious activity, and implement access restrictions to prevent unauthorized access to mobile device management systems.
TA558 Uses AI-Generated Scripts to Deliver Venom RAT in Brazil Hotel Attacks
TA558, tracked as RevengeHotels, has launched new attacks targeting hotels in Brazil and Spanish-speaking markets. The group uses AI-generated scripts to deploy Venom RAT via phishing emails. The campaign aims to capture credit card data from guests and travelers. The threat actor has been active since 2015, focusing on hospitality and travel sectors. They have historically used various RATs and custom malware to achieve their goals. The latest campaign involves phishing emails with Portuguese and Spanish lures, leading to the download of malicious scripts and payloads. Venom RAT, based on Quasar RAT, includes features like data exfiltration, reverse proxy, and anti-kill mechanisms. It spreads via USB drives and disables Microsoft Defender Antivirus.
RaccoonO365 Phishing Network Disrupted by Microsoft and Cloudflare
The RaccoonO365 phishing network, a financially motivated threat group, was disrupted by Microsoft's Digital Crimes Unit (DCU) and Cloudflare. The operation, executed through a court order in the Southern District of New York, seized 338 domains used by the group since July 2024. The network targeted over 2,300 organizations in 94 countries, including at least 20 U.S. healthcare entities, and stole over 5,000 Microsoft 365 credentials. The RaccoonO365 network operated as a phishing-as-a-service (PhaaS) toolkit, marketed to cybercriminals via a subscription model on a private Telegram channel. The group used legitimate tools like Cloudflare Turnstile and Workers scripts to protect their phishing pages, making detection more challenging. The mastermind behind RaccoonO365 is believed to be Joshua Ogundipe, who received over $100,000 in cryptocurrency payments. The group is also suspected to collaborate with Russian-speaking cybercriminals. Cloudflare executed a three-day 'rugpull' against RaccoonO365, banning all identified domains, placing interstitial 'phish warning' pages, terminating associated Workers scripts, and suspending user accounts to prevent re-registration.