Skip to content

Trend Micro Warns of Widespread BadIIS Malware Targeting IIS Servers

Chinese-speaking threat actors are behind this financially motivated campaign. It injects malware into web pages and manipulates SEO to redirect traffic to illegal gambling sites.

In the image there is a spider crawling on the web.
In the image there is a spider crawling on the web.

Trend Micro Warns of Widespread BadIIS Malware Targeting IIS Servers

Cybersecurity firm Trend Micro has uncovered a widespread malware campaign targeting Internet Information Services (IIS) servers. The campaign, linked to Chinese-speaking threat actors, has compromised servers belonging to various sectors across Asia and beyond.

Dubbed BadIIS, the malware has infected organizations ranging from government agencies and universities to technology companies and telecommunications firms. It exploits vulnerabilities in IIS servers, altering HTTP responses to serve two primary purposes: SEO fraud mode and injector mode.

In injector mode, BadIIS injects malicious JavaScript into web pages, rerouting users to attacker-controlled sites hosting malware or phishing schemes. Meanwhile, in SEO fraud mode, the malware redirects traffic from search engine bots to illegal gambling sites, manipulating HTTP responses to mislead SEO trackers. This financially motivated campaign has affected several Asian countries, including India, Thailand, Vietnam, and potentially others like the Philippines, Singapore, Taiwan, South Korea, Japan, Brazil, and Bangladesh.

To secure IIS servers, Trend Micro recommends regular updates, monitoring for unauthorized installations, restricting administrative access, implementing firewalls, reviewing IIS logs, and disabling unnecessary services.

The BadIIS malware campaign highlights the importance of robust cybersecurity measures. Organizations must remain vigilant and proactive in protecting their servers and user data. As the campaign continues to evolve, so too must our defenses.

Read also:

Latest