DragonRank Exploits IIS Servers with BadIIS Malware for SEO Fraud and Gambling Redirects
嗯,用户让我总结一下这篇文章的内容,控制在100个字以内。首先,我需要通读整篇文章,抓住主要信息。文章讲的是网络攻击者针对亚洲的IIS服务器发起的SEO操纵活动,目的是安装BadIIS恶意软件。攻击者通过将用户重定向到非法赌博网站来获利,这表明他们的动机是财务上的。 然后,文章提到受害者包括印度、泰国、越南等国家的政府、大学、科技公司和电信部门。攻击者利用这些被入侵的服务器来提供修改后的内容,比如重定向到赌博网站或连接到托管恶意软件的流氓服务器。 接着,文章指出这个活动可能与一个中文威胁组织DragonRank有关,该组织通过SEO操纵传播BadIIS恶意软件。此外,Trend Micro发现检测到的恶意软件与Group 11使用的变种相似,后者使用两种不同的模式进行SEO欺诈,并在响应中注入可疑的JavaScript代码。 最后,文章提到Fu 2025-2-10 09:44:0 Author: thehackernews.com(查看原文) 阅读量:6 收藏

BadIIS Malware

Threat actors have been observed targeting Internet Information Services (IIS) servers in Asia as part of a search engine optimization (SEO) manipulation campaign designed to install BadIIS malware.

"It is likely that the campaign is financially motivated since redirecting users to illegal gambling websites shows that attackers deploy BadIIS for profit," Trend Micro researchers Ted Lee and Lenart Bermejo said in an analysis published last week,

Targets of the campaign include IIS servers located in India, Thailand, Vietnam, Philippines, Singapore, Taiwan, South Korea, Japan, and Brazil. These servers are associated with government, universities, technology companies, and telecommunications sectors.

Cybersecurity

Requests to the compromised servers can then be served altered content from attackers, ranging from redirections to gambling sites to connecting to rogue servers that host malware or credential harvesting pages.

It's suspected that the activity is the work of a Chinese-speaking threat group known as DragonRank, which was documented by Cisco Talos last year as delivering the BadIIS malware via SEO manipulation schemes.

The DragonRank campaign, in turn, is said to be associated with an entity referred to as Group 9 by ESET in 2021 that leverages compromised IIS servers for proxy services and SEO fraud.

SEO Fraud and Gambling Redirects

Trend Micro, however, noted that the detected malware artifacts share similarities with a variant used by Group 11, featuring two different modes for conducting SEO fraud and injecting suspicious JavaScript code into responses for requests from legitimate visitors.

"The installed BadIIS can alter the HTTP response header information requested from the web server," the researchers said. "It checks the 'User-Agent' and 'Referer' fields in the received HTTP header."

"If these fields contain specific search portal sites or keywords, BadIIS redirects the user to a page associated with an online illegal gambling site instead of a legitimate web page."

Cybersecurity

The development comes as Silent Push linked the China-based Funnull content delivery network (CDN) to a practice it calls infrastructure laundering, in which threat actors rent IP addresses from mainstream hosting providers such as Amazon Web Services (AWS) and Microsoft Azure and use them to host criminal websites.

Funnull is said to have rented over 1,200 IPs from Amazon and nearly 200 IPs from Microsoft, all of which have since been taken down. The malicious infrastructure, dubbed Triad Nexus, has been found to fuel retail phishing schemes, romance baiting scams, and money laundering operations via fake gambling sites.

"But new IPs are continually being acquired every few weeks," the company said. "FUNNULL is likely using fraudulent or stolen accounts to acquire these IPs to map to their CNAMEs."

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/02/dragonrank-exploits-iis-servers-with.html
如有侵权请联系:admin#unsafe.sh