Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Windsurf CEO goes to Google. Openai’s acquisition is falling apart

IPO Firefly Aerospace File

Can “ethical” spyware makers justify offering their technology to ice?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » DragonRank Exploits IIS Servers using BADIIS Malware for SEO Screams and Gambling Redirects
Identity

DragonRank Exploits IIS Servers using BADIIS Malware for SEO Screams and Gambling Redirects

userBy userFebruary 10, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 10, 2025Ravi LakshmananMalware/Web Security

BADIIS Malware

Threat actors have been observed targeting Asian Internet Information Services (IIS) servers as part of a search engine optimization (SEO) operation campaign designed to install BADIIS malware.

“It is likely that the campaign is financially motivated, as redirecting users to illegal gambling websites indicates that attackers will deploy BADII for profit.”

The campaign’s goals include IIS servers in India, Thailand, Vietnam, the Philippines, Singapore, Taiwan, Korea, Japan and Brazil. These servers are associated with governments, universities, technology companies, and the communications sector.

Cybersecurity

Requests to compromised servers can provide modified content from attackers, from redirects to gambling sites, to malicious servers or credential harvesting pages hosting malware.

The activity is suspected to be the work of a Chinese-speaking threat group known as DragonRank. This was recorded last year by Cisco Talos when Badiis malware was delivered via SEO operation schemes.

Secondly, the DragonRank campaign is said to have ESET associated with an entity called Group 9 in 2021, breaching proxy services and IIS servers for SEO scams.

SEO scams and gambling redirects

However, Trend Micro uses group 11, which features two different modes for detecting malware artifacts to carry out SEO scams and inject suspicious JavaScript code in response to requests from legitimate visitors. I noted that they share similarities with the variant.

“A BADII installed may change the HTTP response header information requested by the web server,” the researchers said. Check the User Agent and Reference fields of the received HTTP header. ”

“If these fields contain a specific search portal site or keyword, BADIIS will redirect users to pages associated with illegal online gambling sites, not legitimate web pages.”

Cybersecurity

The development involves a silent push linked to a practice that calls the China-based Funnull Content Delivery Network (CDN) infrastructure laundering. This threat actor rents IP addresses from mainstream hosting providers such as Amazon Web Services (AWS), Microsoft Azure and usage. They host criminal websites.

Funnull is said to have rented over 1,200 IPs from Amazon and approximately 200 IPs from Microsoft. All of these have been removed. A malicious infrastructure called Triad Nexus has been found to refuel retail phishing schemes, romance bait scams and money laundering operations through fake gambling sites.

“But new IPs are continuously acquired every few weeks,” the company said. “Funnull may use fraudulent or stolen accounts to retrieve these IPs and map them to CNAME.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleZimbra releases security updates for SQL injection, saves XSS, saves SSRF vulnerabilities
Next Article Safety regulations involved in the construction of nuclear power plants
user
  • Website

Related Posts

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

July 11, 2025

perfektblue bluetooth vulnerability exposes millions of vehicles to remote code execution

July 11, 2025

Protecting data in the AI ​​era

July 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Windsurf CEO goes to Google. Openai’s acquisition is falling apart

IPO Firefly Aerospace File

Can “ethical” spyware makers justify offering their technology to ice?

Tesla reportedly is starting to sell in India

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.