Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers

Posted on October 6, 2025October 6, 2025 By CWS

Oct 06, 2025Ravie LakshmananMalware / Information Breach
Cybersecurity researchers have make clear a Chinese language-speaking cybercrime group codenamed UAT-8099 that has been attributed to SEO (website positioning) fraud and theft of high-value credentials, configuration information, and certificates information.
The assaults are designed to focus on Microsoft Web Data Providers (IIS) servers, with a lot of the infections reported in India, Thailand, Vietnam, Canada, and Brazil, spanning universities, tech companies, and telecom suppliers. The group was first found in April 2025. The targets are primarily cell customers, encompassing each Android and Apple iPhone gadgets.
UAT-8099 is the most recent China-linked actor to have interaction in website positioning fraud for monetary achieve. As just lately as final month, ESET revealed particulars of one other risk actor named GhostRedirector that has managed to compromise at the very least 65 Home windows servers primarily positioned in Brazil, Thailand, and Vietnam with a malicious IIS module codenamed Gamshen to facilitate website positioning fraud.
“UAT-8099 manipulates search rankings by specializing in respected, high-value IIS servers in focused areas,” Cisco Talos researcher Joey Chen stated. “The group maintains persistence and alters website positioning rankings utilizing internet shells, open-source hacking instruments, Cobalt Strike, and numerous BadIIS malware; their automation scripts are personalized to evade defenses and conceal exercise.”

As soon as a susceptible IIS server is discovered – both through safety vulnerability or weak settings within the internet server’s file add function – the risk actor makes use of the foothold to add internet shells to conduct reconnaissance and collect fundamental system data. The financially motivated hacking group subsequently permits the visitor account to escalate their privileges, all the way in which to the administrator, and use it to allow Distant Desktop Protocol (RDP).
UAT-8099 has additionally been noticed taking steps to plug the preliminary entry pathway to keep up sole management of the compromised hosts and stop different risk actors from compromising the identical servers. As well as, Cobalt Strike is deployed as the popular backdoor for post-exploitation.

With a purpose to obtain persistence, RDP is mixed with VPN instruments like SoftEther VPN, EasyTier, and Quick Reverse Proxy (FRP). The assault chain culminates with the set up of BadIIS malware, which has been put to make use of by a number of Chinese language-speaking risk clusters like DragonRank and Operation Rewrite (aka CL-UNK-1037).

UAT-8099 makes use of RDP to entry IIS servers and seek for useful information throughout the compromised host utilizing a graphical consumer interface (GUI) software named All the things, which is then packaged for both resale or additional exploitation. It isn’t at the moment clear what number of servers the group has compromised.
The BadIIS malware deployed on this case, nevertheless, is a variant that has tweaked its code construction and useful workflow to sidestep detection by antivirus software program. It capabilities equally to Gamshen in that the website positioning manipulation element kicks in solely when the request originates from Google (i.e., Consumer-Agent is Googlebot).

BadIIS can function in three completely different modes –

Proxy, which extracts the encoded, embedded command-and-control (C2) server deal with and makes use of it as a proxy to retrieve content material from a secondary C2 server
Injector, which intercepts browser requests originating from Google search outcomes, connects to the C2 server to retrieve JavaScript code, embeds the downloaded JavaScript into the HTML content material of the response, and returns the altered response again to redirect the sufferer to the chosen vacation spot (unauthorized ads or unlawful playing web sites)
website positioning fraud, which compromises a number of IIS servers to conduct website positioning fraud by serving backlinks to artificially increase web site rankings

“The actor employs a traditional website positioning method often called backlinking to spice up web site visibility,” Talos stated. “Google’s search engine makes use of backlinks to find further websites and assess key phrase relevance.”
“The next variety of backlinks will increase the chance of Google crawlers visiting a web site, which might speed up rating enhancements and improve publicity for the webpages. Nonetheless, merely accumulating backlinks with out regard to high quality can result in penalties from Google.”

The Hacker News Tags:Chinese, Compromised, Cybercrime, Fraud, Global, Group, IIS, Ring, Runs, SEO, Servers

Post navigation

Previous Post: Hackers Extorting Salesforce After Stealing Data From Dozens of Customers
Next Post: 5 Critical Questions For Adopting an AI Security Solution

Related Posts

Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages The Hacker News
Transforming Your Cybersecurity Practice Into An MRR Machine The Hacker News
How to Protect Your Backups The Hacker News
Why Offensive Security Training Benefits Your Entire Security Team The Hacker News
SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers The Hacker News
Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News