Cisco Talos has identified a widespread campaign by Chinese-speaking threat actor UAT-8099 targeting vulnerable IIS servers across Asia with BadIIS malware. The campaign hijacks legitimate organizational websites to conduct SEO fraud for online gambling sites while simultaneously stealing visitor credentials.

Campaign overview

AttributeDetails
Threat actorUAT-8099
AttributionChinese-speaking cybercrime group
Malware familyBadIIS
TargetIIS web servers
Primary regionsThailand, Vietnam, India, Pakistan, Japan
Campaign periodLate 2025 - Early 2026
DiscoveryCisco Talos

Geographic targeting

Affected regions

RegionTargeting intensity
ThailandHigh concentration
VietnamHigh concentration
IndiaModerate
PakistanModerate
JapanModerate
CanadaSome activity
BrazilSome activity

Victim organizations

SectorExamples
UniversitiesAcademic institutions
Technology companiesTech firms
TelecommunicationsISPs and telcos
GovernmentGovernment agencies

BadIIS malware

What is BadIIS?

AttributeDetails
First observed2021
TypeNative IIS module
IntegrationWeb server request pipeline
PrivilegesInherits web server permissions
PurposeSEO fraud, credential theft, redirects

BadIIS is an umbrella term for malicious native IIS modules that intercept website traffic. These modules integrate directly into the web server’s request pipeline, allowing comprehensive traffic manipulation.

Regional variants

VariantTarget
IISHijackVietnam specifically
asdSearchEngineThailand / Thai language users

The variants demonstrate UAT-8099’s regional customization, adapting malware behavior based on victim location and language preferences.

Operational modes

ModeFunction
Proxy modeRoute traffic through attacker infrastructure
Injector modeInsert content into legitimate pages
SEO fraud modeServe SEO content to search crawlers

Attack methodology

Initial compromise

StageAction
1Scan for vulnerable IIS servers
2Exploit security misconfigurations
3Exploit file upload vulnerabilities
4Upload web shells

Post-exploitation

StageAction
5Conduct reconnaissance
6Escalate privileges
7Enable RDP access
8Install persistence mechanisms
9Deploy BadIIS malware

Tools used

ToolPurpose
Web shellsInitial access
Cobalt StrikeBackdoor
SoftEther VPNPersistence/tunneling
Fast Reverse Proxy (FRP)Traffic routing
Custom automation scriptsDefense evasion

SEO fraud operation

Dual-behavior system

Visitor typeBadIIS behavior
Search engine crawlerServe gambling SEO keywords
Human visitor (legitimate)Pass through unchanged
Human visitor (targeted)Redirect or inject content

How SEO poisoning works

StepAction
1Crawler visits compromised legitimate site
2BadIIS detects crawler user-agent
3Returns page stuffed with gambling keywords
4Search engine indexes gambling content
5Gambling sites rank higher using victim’s reputation

By injecting SEO content only for search crawlers, attackers exploit the legitimate site’s domain authority without alerting human visitors or site administrators.

Credential theft

Injection capabilities

CapabilityImpact
Form injectionCapture login credentials
JavaScript injectionKeylogging, data theft
Redirect injectionSend users to phishing sites

Detection indicators

Network indicators

IndicatorDescription
Unusual IIS module loadingNative module installations
Crawler-specific responsesDifferent content for bots
Gambling keyword trafficSEO content in responses
C2 communicationsCobalt Strike beacons

Host indicators

IndicatorDescription
New IIS native modulesUnauthorized DLLs in IIS
Web shellsUnexpected ASPX/PHP files
VPN softwareSoftEther, FRP installations
Modified IIS configurationapplicationHost.config changes

Recommendations

For IIS administrators

PriorityAction
CriticalAudit installed IIS modules
CriticalReview file upload functionality
HighImplement Web Application Firewall
HighMonitor for configuration changes
MediumRestrict module installation permissions

For security teams

PriorityAction
HighHunt for BadIIS indicators
HighMonitor crawler vs. human response differences
MediumImplement IIS integrity monitoring
MediumDeploy behavior-based detection

For organizations

PriorityAction
HighPatch IIS servers promptly
HighRestrict administrative access
MediumImplement network segmentation
MediumMonitor outbound connections

Context

UAT-8099’s BadIIS campaign demonstrates how threat actors monetize compromised web servers beyond traditional data theft. By exploiting the trust search engines place in legitimate organizational domains, attackers can boost gambling and other illicit sites’ search rankings—a service with real black-market value.

The dual-behavior approach makes detection challenging: administrators and regular visitors see normal website operation, while search crawlers receive entirely different content. Only by specifically testing crawler responses can organizations detect the compromise.

The regional focus on Southeast Asia, particularly Thailand and Vietnam, with customized malware variants suggests either regional criminal partnerships or specific market targeting for the gambling SEO services.

For IIS administrators, the key defensive measure is monitoring and restricting native module installations. BadIIS requires loading a malicious DLL into the IIS pipeline—an action that should trigger alerts in properly monitored environments.

The combination of Cobalt Strike for persistent access and VPN tools for tunneling indicates a sophisticated operation capable of long-term presence on compromised servers. Organizations discovering BadIIS indicators should assume broader compromise and conduct thorough incident response.