Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS

UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS

Posted on January 30, 2026January 30, 2026 By CWS

A brand new wave of focused assaults has emerged towards Web Info Companies (IIS) servers throughout Asia, with menace actors deploying refined malware designed to compromise weak programs.

The marketing campaign, energetic from late 2025 by means of early 2026, focuses totally on victims in Thailand and Vietnam, marking a strategic shift towards region-specific operations.

The attackers exploit unpatched IIS servers to inject malicious internet shells, execute PowerShell scripts, and deploy the BadIIS malware, which now contains hardcoded regional configurations tailor-made to particular international locations.

The menace marketing campaign demonstrates operational overlap with the beforehand documented WEBJACK operation, sharing widespread indicators similar to malware signatures, command and management infrastructure, and focused sufferer profiles.

Attackers leverage internet shells as their preliminary foothold, permitting them to execute instructions remotely on compromised servers.

Following profitable infiltration, they deploy PowerShell scripts to obtain and execute the GotoHTTP distant entry instrument, granting persistent management over contaminated programs.

This multi-stage an infection chain allows menace actors to keep up long-term entry whereas avoiding detection by means of using professional administrative instruments.

Cisco Talos analysts recognized the marketing campaign after observing suspicious exercise throughout a number of IIS deployments in South and Southeast Asia.

The researchers famous that BadIIS variants now embed nation codes instantly into their supply code, creating specialised variations for Vietnam (recognized by “VN” tags) and Thailand (marked with “TH” designations).

These personalized variants embrace region-specific file extensions, dynamic web page configurations, and localized HTML templates that facilitate SEO fraud focusing on particular language preferences.

The malware’s evolution displays a extra focused strategy in comparison with earlier variations. Every BadIIS variant filters internet visitors based mostly on the “Settle for-Language” header to confirm the customer’s area earlier than delivering malicious payloads.

Content material for crawlers (Supply – Cisco Talos)

When search engine crawlers go to contaminated websites, they’re redirected to fraudulent playing web sites, whereas common customers obtain injected JavaScript that silently redirects their browsers to malicious locations.

Persistence Mechanisms and Hidden Account Creation

After establishing preliminary entry, the menace actors create hidden consumer accounts to keep up persistent management over compromised servers.

The attackers initially used an account named “admin$” however shifted to various names like “mysql$,” “admin1$,” “admin2$,” and “energy$” after safety merchandise started detecting the unique naming sample.

BadIIS IISHijack model (Supply – Cisco Talos)

These accounts are assigned administrative privileges and used to deploy up to date variations of BadIIS malware to particular regional directories similar to “C:/Customers/mssql$/Desktop/VN/” for Vietnam-targeted operations and “C:/Customers/mssql$/Desktop/newth/” for Thailand-focused assaults.

Extensions record for filtering (Supply – Cisco Talos)

The menace actors additionally deploy anti-forensic instruments together with Sharp4RemoveLog to erase Home windows occasion logs, CnCrypt Shield to cover malicious recordsdata, and OpenArk64 to terminate safety processes on the kernel stage, making certain their operations stay undetected for prolonged intervals.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:BadIIS, IIS, PowerShell, RegionCustomized, Servers, Shells, Targets, UAT8099, Vulnerable, Web

Post navigation

Previous Post: 175,000 Exposed Ollama Hosts Enable Code Execution and External System Access
Next Post: In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak

Related Posts

CISA Warns of Android 0-Day Vulnerability Exploited in Attacks CISA Warns of Android 0-Day Vulnerability Exploited in Attacks Cyber Security News
Hackers Exploiting Critical Langflow Vulnerability to Deploy Flodrix Botnet and Take System Control Hackers Exploiting Critical Langflow Vulnerability to Deploy Flodrix Botnet and Take System Control Cyber Security News
Weaponized DMV-Themed Phishing Attacking U.S. Citizens to Harvest Personal and Financial Data Weaponized DMV-Themed Phishing Attacking U.S. Citizens to Harvest Personal and Financial Data Cyber Security News
New ‘Win-DoS’ Zero-Click Vulnerabilities Turns Windows Domain Controllers into DDOS Botnet New ‘Win-DoS’ Zero-Click Vulnerabilities Turns Windows Domain Controllers into DDOS Botnet Cyber Security News
OpenAI Introduces AI Safety Bug Bounty Program OpenAI Introduces AI Safety Bug Bounty Program Cyber Security News
CISA Releases Best Security Practices Guide for Hardening Microsoft Exchange Server CISA Releases Best Security Practices Guide for Hardening Microsoft Exchange Server Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark