-0.4 C
New York
Saturday, February 22, 2025

DragonRank Exploits IIS Servers with BadIIS Malware for search engine optimisation Fraud and Playing Redirects


Feb 10, 2025Ravie LakshmananMalware / Internet Safety

DragonRank Exploits IIS Servers with BadIIS Malware for search engine optimisation Fraud and Playing Redirects

Menace actors have been noticed concentrating on Web Info Companies (IIS) servers in Asia as a part of a search engine marketing (search engine optimisation) manipulation marketing campaign designed to put in BadIIS malware.

“It’s probably that the marketing campaign is financially motivated since redirecting customers to unlawful playing web sites exhibits that attackers deploy BadIIS for revenue,” Pattern Micro researchers Ted Lee and Lenart Bermejo mentioned in an evaluation revealed final week,

Targets of the marketing campaign embrace IIS servers situated in India, Thailand, Vietnam, Philippines, Singapore, Taiwan, South Korea, Japan, and Brazil. These servers are related to authorities, universities, expertise corporations, and telecommunications sectors.

Cybersecurity

Requests to the compromised servers can then be served altered content material from attackers, starting from redirections to playing websites to connecting to rogue servers that host malware or credential harvesting pages.

It is suspected that the exercise is the work of a Chinese language-speaking risk group referred to as DragonRank, which was documented by Cisco Talos final 12 months as delivering the BadIIS malware through search engine optimisation manipulation schemes.

The DragonRank marketing campaign, in flip, is claimed to be related to an entity known as Group 9 by ESET in 2021 that leverages compromised IIS servers for proxy companies and search engine optimisation fraud.

SEO Fraud and Gambling Redirects

Pattern Micro, nevertheless, famous that the detected malware artifacts share similarities with a variant utilized by Group 11, that includes two completely different modes for conducting search engine optimisation fraud and injecting suspicious JavaScript code into responses for requests from reputable guests.

“The put in BadIIS can alter the HTTP response header info requested from the online server,” the researchers mentioned. “It checks the ‘Person-Agent’ and ‘Referer’ fields within the obtained HTTP header.”

“If these fields comprise particular search portal websites or key phrases, BadIIS redirects the person to a web page related to a web based unlawful playing website as a substitute of a reputable internet web page.”

Cybersecurity

The event comes as Silent Push linked the China-based Funnull content material supply community (CDN) to a apply it calls infrastructure laundering, through which risk actors lease IP addresses from mainstream internet hosting suppliers reminiscent of Amazon Internet Companies (AWS) and Microsoft Azure and use them to host legal web sites.

Funnull is claimed to have rented over 1,200 IPs from Amazon and almost 200 IPs from Microsoft, all of which have since been taken down. The malicious infrastructure, dubbed Triad Nexus, has been discovered to gasoline retail phishing schemes, romance baiting scams, and cash laundering operations through pretend playing websites.

“However new IPs are frequently being acquired each few weeks,” the corporate mentioned. “FUNNULL is probably going utilizing fraudulent or stolen accounts to amass these IPs to map to their CNAMEs.”

Discovered this text attention-grabbing? Observe us on Twitter and LinkedIn to learn extra unique content material we put up.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles