-6.9 C
United States of America
Tuesday, February 11, 2025

DragonRank Exploits IIS Servers with BadIIS Malware for search engine optimization Fraud and Playing Redirects


Feb 10, 2025Ravie LakshmananMalware / Net Safety

DragonRank Exploits IIS Servers with BadIIS Malware for search engine optimization Fraud and Playing Redirects

Menace actors have been noticed focusing on Web Info Companies (IIS) servers in Asia as a part of a search engine marketing (search engine optimization) manipulation marketing campaign designed to put in BadIIS malware.

“It’s probably that the marketing campaign is financially motivated since redirecting customers to unlawful playing web sites exhibits that attackers deploy BadIIS for revenue,” Pattern Micro researchers Ted Lee and Lenart Bermejo stated in an evaluation printed final week,

Targets of the marketing campaign embrace IIS servers positioned in India, Thailand, Vietnam, Philippines, Singapore, Taiwan, South Korea, Japan, and Brazil. These servers are related to authorities, universities, expertise firms, and telecommunications sectors.

Cybersecurity

Requests to the compromised servers can then be served altered content material from attackers, starting from redirections to playing websites to connecting to rogue servers that host malware or credential harvesting pages.

It is suspected that the exercise is the work of a Chinese language-speaking menace group often known as DragonRank, which was documented by Cisco Talos final 12 months as delivering the BadIIS malware through search engine optimization manipulation schemes.

The DragonRank marketing campaign, in flip, is alleged to be related to an entity known as Group 9 by ESET in 2021 that leverages compromised IIS servers for proxy providers and search engine optimization fraud.

SEO Fraud and Gambling Redirects

Pattern Micro, nevertheless, famous that the detected malware artifacts share similarities with a variant utilized by Group 11, that includes two completely different modes for conducting search engine optimization fraud and injecting suspicious JavaScript code into responses for requests from professional guests.

“The put in BadIIS can alter the HTTP response header data requested from the online server,” the researchers stated. “It checks the ‘Consumer-Agent’ and ‘Referer’ fields within the obtained HTTP header.”

“If these fields comprise particular search portal websites or key phrases, BadIIS redirects the consumer to a web page related to a web-based unlawful playing web site as an alternative of a professional net web page.”

Cybersecurity

The event comes as Silent Push linked the China-based Funnull content material supply community (CDN) to a observe it calls infrastructure laundering, by which menace actors lease IP addresses from mainstream internet hosting suppliers reminiscent of Amazon Net Companies (AWS) and Microsoft Azure and use them to host legal web sites.

Funnull is alleged to have rented over 1,200 IPs from Amazon and practically 200 IPs from Microsoft, all of which have since been taken down. The malicious infrastructure, dubbed Triad Nexus, has been discovered to gasoline retail phishing schemes, romance baiting scams, and cash laundering operations through pretend playing websites.

“However new IPs are regularly being acquired each few weeks,” the corporate stated. “Funnull is probably going utilizing fraudulent or stolen accounts to accumulate these IPs to map to their CNAMEs.”

Discovered this text fascinating? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles