Over 1,800 Windows Servers Compromised by BADIIS Malware in Large-Scale SEO Poisoning Campaign

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

A sophisticated cyber campaign has compromised over 1,800 Windows servers globally, using a potent malware strain known as BADIIS.

This operation targets Internet Information Services (IIS) environments, transforming legitimate infrastructure into a massive network for SEO poisoning.

By hijacking these servers, threat actors manipulate search engine results to promote illicit gambling platforms and fraudulent cryptocurrency sites, effectively monetizing compromised systems while evading traditional security defenses.

The attack vectors used in this campaign are concerning due to their ability to affect high-profile sectors, including government agencies, educational institutions, and financial organizations across multiple countries.

The malware integrates deeply into the web server’s core processes, allowing it to intercept and modify HTTP traffic in real-time.

This silent intrusion enables attackers to redirect specific visitors to malicious destinations without disrupting the server’s normal operations for regular users or administrators.

Elastic Security Labs analysts identified the malware after observing distinct post-compromise behaviors during a forensic investigation of a multinational organization.

Execution flow (Source – Elastic)

Their research links this activity to a threat group tracked as UAT-8099, noting that the campaign exhibits a high level of operational security.

The analysts discovered that the malware had been deployed across diverse industries, with a significant concentration of victims in the Asia-Pacific region, indicating a strategic effort to exploit regions with specific internet usage patterns.

Advanced Evasion and Persistence Tactics

BADIIS’s sophistication lies in its implementation as a malicious native IIS module, allowing it to achieve persistence and evade detection with remarkable efficiency.

Unlike malware running as separate processes, BADIIS loads directly into the IIS worker process, making it difficult to distinguish from legitimate server activities.

Inlined SEO backlinks on the infected page (Source – Elastic)

Once installed, the malware employs a “context-aware” filtering mechanism to determine how to handle incoming traffic.

It inspects the HTTP headers of every request, specifically looking for User-Agent strings associated with search engine crawlers like Googlebot.

When a crawler is detected, BADIIS injects SEO keywords and links into the server’s response, boosting the ranking of malicious sites.

Conversely, if a system administrator or regular user accesses the site, the malware serves the clean, original content. This split-view technique ensures that the compromise remains invisible to human operators while actively poisoning search results.

Redirected sites for users (Source – Elastic)

Furthermore, the use of direct system calls helps the malware bypass endpoint detection and response (EDR) hooks, securing its presence on the victim’s machine.

Organizations must regularly inspect installed IIS modules for unsigned or unrecognized components to detect potential infections.

It is also essential to monitor for unexpected network connections initiated by the IIS worker process and ensure all Windows Servers are patched against known vulnerabilities to prevent future compromises.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.