Chinese Cybercriminals Exploit IIS Servers for SEO Fraud, Data Theft

Chinese-speaking cybercrime group UAT-8099 exploits Microsoft IIS servers for SEO fraud and data theft across multiple countries using customized malware and advanced hacking tools.

  • A Chinese-speaking cybercriminal group named UAT-8099 targets Microsoft Internet Information Services (IIS) servers to commit SEO fraud and steal sensitive data.
  • The group operates mainly in India, Thailand, Vietnam, Canada, and Brazil, targeting universities, tech companies, and telecom providers.
  • They exploit security weaknesses to install web shells, escalate privileges, enable Remote Desktop Protocol (RDP), and deploy customized Malware like BadIIS.
  • UAT-8099 uses various tools including open-source software, Cobalt Strike, and VPN services to maintain persistence and evade detection.
  • The group’s malware alters web traffic to boost search engine rankings through backlink manipulation, redirecting users to unauthorized ads or gambling sites.

Cybersecurity researchers have identified a Chinese-speaking cybercrime group called UAT-8099 responsible for search engine optimization (SEO) fraud and the theft of high-value credentials, configuration files, and certificates. The group primarily targets Microsoft Internet Information Services (IIS) servers and was first observed in April 2025. Most attacks have been reported across India, Thailand, Vietnam, Canada, and Brazil, focusing on mobile users with Android and Apple devices.

- Advertisement -

According to Cisco Talos researcher Joey Chen, UAT-8099 attacks reputable IIS servers in targeted regions to manipulate search rankings. The group employs web shells, open-source Hacking tools, Cobalt Strike, and customized BadIIS malware to maintain access and conceal their activities. They exploit vulnerabilities or weak server file upload settings to gain initial entry.

After breaching a server, UAT-8099 escalates user privileges by enabling the guest account and activating Remote Desktop Protocol (RDP) access. The group secures their control by blocking other attackers’ access and uses RDP combined with VPN tools like SoftEther VPN, EasyTier, and Fast Reverse Proxy (FRP) to sustain persistence.

UAT-8099 then installs a variant of BadIIS malware, similar to previously known threats such as Gamshen, which activates only when requests come from Google by checking if the user agent is Googlebot. This malware operates in three modes: proxying to communicate with command-and-control (C2) servers, injecting malicious JavaScript into responses to redirect users to unauthorized ads or gambling sites, and conducting SEO fraud through backlinking.

The group uses a graphical search tool called Everything within the compromised IIS servers to locate valuable information, which they then package for resale or further exploitation. Yet, the total number of compromised servers remains unknown.

- Advertisement -

Cisco Talos explained that backlinking—a technique involving links pointing to a website—is commonly used to increase search engine visibility. However, accumulating backlinks indiscriminately can result in penalties from Google, making the group’s approach risky despite its potential for financial gain.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

U.S. Sanctions Crypto Exchanges Aiding Iran’s Regime

The U.S. Treasury Department has, for the first time, sanctioned entire cryptocurrency exchanges under...

US sanctions crypto exchanges tied to Iran in first move

The U.S. Treasury sanctioned two UK-registered crypto exchanges for the first time under its...

ShinyHunters Expand Saas Attacks with Vishing Campaign

Google's Mandiant reported a surge in advanced voice phishing attacks by the ShinyHunters group,...

BRICS Nations Shift From Dollar With CBDC Payment Corridors

BRICS nations are accelerating development of payment systems using central bank digital currencies (CBDCs)...

Binance Blames Macro Shock for Oct. 10 Crypto Flash Crash

A macro shock collided with over $100 billion in leveraged positions to trigger a...
- Advertisement -

Must Read

Best Metaverse Tokens to Buy on Binance for 10X Gains

Ever since Facebook renamed their company to Meta, as well as their plans to build a metaverse where we can travel into using Virtual...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!