Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS

Posted on January 30, 2026January 30, 2026 By CWS

A brand new wave of focused assaults has emerged towards Web Info Companies (IIS) servers throughout Asia, with menace actors deploying refined malware designed to compromise weak programs.

The marketing campaign, energetic from late 2025 by means of early 2026, focuses totally on victims in Thailand and Vietnam, marking a strategic shift towards region-specific operations.

The attackers exploit unpatched IIS servers to inject malicious internet shells, execute PowerShell scripts, and deploy the BadIIS malware, which now contains hardcoded regional configurations tailor-made to particular international locations.

The menace marketing campaign demonstrates operational overlap with the beforehand documented WEBJACK operation, sharing widespread indicators similar to malware signatures, command and management infrastructure, and focused sufferer profiles.

Attackers leverage internet shells as their preliminary foothold, permitting them to execute instructions remotely on compromised servers.

Following profitable infiltration, they deploy PowerShell scripts to obtain and execute the GotoHTTP distant entry instrument, granting persistent management over contaminated programs.

This multi-stage an infection chain allows menace actors to keep up long-term entry whereas avoiding detection by means of using professional administrative instruments.

Cisco Talos analysts recognized the marketing campaign after observing suspicious exercise throughout a number of IIS deployments in South and Southeast Asia.

The researchers famous that BadIIS variants now embed nation codes instantly into their supply code, creating specialised variations for Vietnam (recognized by “VN” tags) and Thailand (marked with “TH” designations).

These personalized variants embrace region-specific file extensions, dynamic web page configurations, and localized HTML templates that facilitate SEO fraud focusing on particular language preferences.

The malware’s evolution displays a extra focused strategy in comparison with earlier variations. Every BadIIS variant filters internet visitors based mostly on the “Settle for-Language” header to confirm the customer’s area earlier than delivering malicious payloads.

Content material for crawlers (Supply – Cisco Talos)

When search engine crawlers go to contaminated websites, they’re redirected to fraudulent playing web sites, whereas common customers obtain injected JavaScript that silently redirects their browsers to malicious locations.

Persistence Mechanisms and Hidden Account Creation

After establishing preliminary entry, the menace actors create hidden consumer accounts to keep up persistent management over compromised servers.

The attackers initially used an account named “admin$” however shifted to various names like “mysql$,” “admin1$,” “admin2$,” and “energy$” after safety merchandise started detecting the unique naming sample.

BadIIS IISHijack model (Supply – Cisco Talos)

These accounts are assigned administrative privileges and used to deploy up to date variations of BadIIS malware to particular regional directories similar to “C:/Customers/mssql$/Desktop/VN/” for Vietnam-targeted operations and “C:/Customers/mssql$/Desktop/newth/” for Thailand-focused assaults.

Extensions record for filtering (Supply – Cisco Talos)

The menace actors additionally deploy anti-forensic instruments together with Sharp4RemoveLog to erase Home windows occasion logs, CnCrypt Shield to cover malicious recordsdata, and OpenArk64 to terminate safety processes on the kernel stage, making certain their operations stay undetected for prolonged intervals.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:BadIIS, IIS, PowerShell, RegionCustomized, Servers, Shells, Targets, UAT8099, Vulnerable, Web

Post navigation

Previous Post: Aisy Launches Out of Stealth to Transform Vulnerability Management
Next Post: In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak

Related Posts

Ransomware Gangs Leverage Remote Access Tools to Gain Persistence and Evade Defenses Cyber Security News
Microsoft Teams RCE Vulnerability Let Attackers Read, Write and Delete Messages Cyber Security News
Sendmarc Appoints Dan Levinson as Customer Success Director in North America Cyber Security News
Hundreds of Free VPN Apps for Both Android and iOS Leaks Users Personal Data Cyber Security News
Ollama Vulnerabilities Let Attackers Execute Arbitrary Code by Parsing of Malicious Model Files Cyber Security News
AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak
  • UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
  • Aisy Launches Out of Stealth to Transform Vulnerability Management
  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak
  • UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
  • Aisy Launches Out of Stealth to Transform Vulnerability Management
  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark