Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers

Posted on October 6, 2025October 6, 2025 By CWS

Oct 06, 2025Ravie LakshmananMalware / Information Breach
Cybersecurity researchers have make clear a Chinese language-speaking cybercrime group codenamed UAT-8099 that has been attributed to SEO (website positioning) fraud and theft of high-value credentials, configuration information, and certificates information.
The assaults are designed to focus on Microsoft Web Data Providers (IIS) servers, with a lot of the infections reported in India, Thailand, Vietnam, Canada, and Brazil, spanning universities, tech companies, and telecom suppliers. The group was first found in April 2025. The targets are primarily cell customers, encompassing each Android and Apple iPhone gadgets.
UAT-8099 is the most recent China-linked actor to have interaction in website positioning fraud for monetary achieve. As just lately as final month, ESET revealed particulars of one other risk actor named GhostRedirector that has managed to compromise at the very least 65 Home windows servers primarily positioned in Brazil, Thailand, and Vietnam with a malicious IIS module codenamed Gamshen to facilitate website positioning fraud.
“UAT-8099 manipulates search rankings by specializing in respected, high-value IIS servers in focused areas,” Cisco Talos researcher Joey Chen stated. “The group maintains persistence and alters website positioning rankings utilizing internet shells, open-source hacking instruments, Cobalt Strike, and numerous BadIIS malware; their automation scripts are personalized to evade defenses and conceal exercise.”

As soon as a susceptible IIS server is discovered – both through safety vulnerability or weak settings within the internet server’s file add function – the risk actor makes use of the foothold to add internet shells to conduct reconnaissance and collect fundamental system data. The financially motivated hacking group subsequently permits the visitor account to escalate their privileges, all the way in which to the administrator, and use it to allow Distant Desktop Protocol (RDP).
UAT-8099 has additionally been noticed taking steps to plug the preliminary entry pathway to keep up sole management of the compromised hosts and stop different risk actors from compromising the identical servers. As well as, Cobalt Strike is deployed as the popular backdoor for post-exploitation.

With a purpose to obtain persistence, RDP is mixed with VPN instruments like SoftEther VPN, EasyTier, and Quick Reverse Proxy (FRP). The assault chain culminates with the set up of BadIIS malware, which has been put to make use of by a number of Chinese language-speaking risk clusters like DragonRank and Operation Rewrite (aka CL-UNK-1037).

UAT-8099 makes use of RDP to entry IIS servers and seek for useful information throughout the compromised host utilizing a graphical consumer interface (GUI) software named All the things, which is then packaged for both resale or additional exploitation. It isn’t at the moment clear what number of servers the group has compromised.
The BadIIS malware deployed on this case, nevertheless, is a variant that has tweaked its code construction and useful workflow to sidestep detection by antivirus software program. It capabilities equally to Gamshen in that the website positioning manipulation element kicks in solely when the request originates from Google (i.e., Consumer-Agent is Googlebot).

BadIIS can function in three completely different modes –

Proxy, which extracts the encoded, embedded command-and-control (C2) server deal with and makes use of it as a proxy to retrieve content material from a secondary C2 server
Injector, which intercepts browser requests originating from Google search outcomes, connects to the C2 server to retrieve JavaScript code, embeds the downloaded JavaScript into the HTML content material of the response, and returns the altered response again to redirect the sufferer to the chosen vacation spot (unauthorized ads or unlawful playing web sites)
website positioning fraud, which compromises a number of IIS servers to conduct website positioning fraud by serving backlinks to artificially increase web site rankings

“The actor employs a traditional website positioning method often called backlinking to spice up web site visibility,” Talos stated. “Google’s search engine makes use of backlinks to find further websites and assess key phrase relevance.”
“The next variety of backlinks will increase the chance of Google crawlers visiting a web site, which might speed up rating enhancements and improve publicity for the webpages. Nonetheless, merely accumulating backlinks with out regard to high quality can result in penalties from Google.”

The Hacker News Tags:Chinese, Compromised, Cybercrime, Fraud, Global, Group, IIS, Ring, Runs, SEO, Servers

Post navigation

Previous Post: Hackers Extorting Salesforce After Stealing Data From Dozens of Customers
Next Post: 5 Critical Questions For Adopting an AI Security Solution

Related Posts

Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies The Hacker News
Google’s August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild The Hacker News
Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories The Hacker News
[Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them The Hacker News
Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks The Hacker News
Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark