Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS

UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS

Posted on January 30, 2026January 30, 2026 By CWS

A brand new wave of focused assaults has emerged towards Web Info Companies (IIS) servers throughout Asia, with menace actors deploying refined malware designed to compromise weak programs.

The marketing campaign, energetic from late 2025 by means of early 2026, focuses totally on victims in Thailand and Vietnam, marking a strategic shift towards region-specific operations.

The attackers exploit unpatched IIS servers to inject malicious internet shells, execute PowerShell scripts, and deploy the BadIIS malware, which now contains hardcoded regional configurations tailor-made to particular international locations.

The menace marketing campaign demonstrates operational overlap with the beforehand documented WEBJACK operation, sharing widespread indicators similar to malware signatures, command and management infrastructure, and focused sufferer profiles.

Attackers leverage internet shells as their preliminary foothold, permitting them to execute instructions remotely on compromised servers.

Following profitable infiltration, they deploy PowerShell scripts to obtain and execute the GotoHTTP distant entry instrument, granting persistent management over contaminated programs.

This multi-stage an infection chain allows menace actors to keep up long-term entry whereas avoiding detection by means of using professional administrative instruments.

Cisco Talos analysts recognized the marketing campaign after observing suspicious exercise throughout a number of IIS deployments in South and Southeast Asia.

The researchers famous that BadIIS variants now embed nation codes instantly into their supply code, creating specialised variations for Vietnam (recognized by “VN” tags) and Thailand (marked with “TH” designations).

These personalized variants embrace region-specific file extensions, dynamic web page configurations, and localized HTML templates that facilitate SEO fraud focusing on particular language preferences.

The malware’s evolution displays a extra focused strategy in comparison with earlier variations. Every BadIIS variant filters internet visitors based mostly on the “Settle for-Language” header to confirm the customer’s area earlier than delivering malicious payloads.

Content material for crawlers (Supply – Cisco Talos)

When search engine crawlers go to contaminated websites, they’re redirected to fraudulent playing web sites, whereas common customers obtain injected JavaScript that silently redirects their browsers to malicious locations.

Persistence Mechanisms and Hidden Account Creation

After establishing preliminary entry, the menace actors create hidden consumer accounts to keep up persistent management over compromised servers.

The attackers initially used an account named “admin$” however shifted to various names like “mysql$,” “admin1$,” “admin2$,” and “energy$” after safety merchandise started detecting the unique naming sample.

BadIIS IISHijack model (Supply – Cisco Talos)

These accounts are assigned administrative privileges and used to deploy up to date variations of BadIIS malware to particular regional directories similar to “C:/Customers/mssql$/Desktop/VN/” for Vietnam-targeted operations and “C:/Customers/mssql$/Desktop/newth/” for Thailand-focused assaults.

Extensions record for filtering (Supply – Cisco Talos)

The menace actors additionally deploy anti-forensic instruments together with Sharp4RemoveLog to erase Home windows occasion logs, CnCrypt Shield to cover malicious recordsdata, and OpenArk64 to terminate safety processes on the kernel stage, making certain their operations stay undetected for prolonged intervals.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:BadIIS, IIS, PowerShell, RegionCustomized, Servers, Shells, Targets, UAT8099, Vulnerable, Web

Post navigation

Previous Post: 175,000 Exposed Ollama Hosts Enable Code Execution and External System Access
Next Post: In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak

Related Posts

Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab Cyber Security News
TangleCrypt Windows Packer with Ransomware Payloads Evades EDR Using ABYSSWORKER Driver TangleCrypt Windows Packer with Ransomware Payloads Evades EDR Using ABYSSWORKER Driver Cyber Security News
Odyssey Stealer Escalates Threats to macOS Users Odyssey Stealer Escalates Threats to macOS Users Cyber Security News
Crypto User Loses ,000 in Seconds After Clicking Instagram Ad Promising Easy Profits Crypto User Loses $9,000 in Seconds After Clicking Instagram Ad Promising Easy Profits Cyber Security News
TP-Link Archer Vulnerability Let Attackers Take Control Over the Router TP-Link Archer Vulnerability Let Attackers Take Control Over the Router Cyber Security News
Attackers Redirected Employee Paychecks Without Breaching a Single System Attackers Redirected Employee Paychecks Without Breaching a Single System Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News