BadIIS Malware-as-a-Service Ecosystem Targeting IIS Servers
A commodity BadIIS malware variant is fueling a thriving malware-as-a-service (MaaS) ecosystem for Chinese-speaking cybercrime groups, allowing them to execute malicious SEO fraud, hijack server content, and redirect traffic to illicit sites.
A new commodity BadIIS malware variant has been discovered fueling a malware-as-a-service (MaaS) ecosystem targeting IIS servers. This toolset, identifiable by its embedded “demo.pdb” strings, has undergone multi-year development with builder tools and persistence mechanisms. Chinese-speaking cybercrime groups are leveraging this framework to perform malicious search engine optimization (SEO) fraud, hijack server content, and redirect traffic to illicit sites. The malware author constantly pushes rapid updates to introduce new features and evade security vendors, making it a persistent threat. This BadIIS variant lowers the barrier to entry for cybercriminals, leading to widespread attacks that silently hijack server traffic.
Attack Chain
- The attacker gains initial access to the target IIS server through unknown means.
- The attacker deploys the BadIIS malware, often utilizing Chinese-language folder paths, onto the compromised server.
- The BadIIS malware installs itself as an IIS module, allowing it to intercept and modify HTTP requests.
- The malware configures traffic redirection rules, redirecting legitimate user traffic to attacker-controlled illicit sites.
- The malware performs malicious SEO fraud by injecting hidden keywords and links into server content, boosting the ranking of malicious websites.
- The BadIIS malware is updated with reactive evasion tactics to avoid detection by security vendors.
- The attacker monitors the hijacked traffic and SEO performance, making adjustments to maximize profits.
- The attacker maintains persistence on the compromised server for continued operation and potential further exploitation.
Impact
Compromised IIS servers are silently redirected to illicit sites, leading to financial losses for victims and reputational damage for server owners. The malware’s ability to perform SEO fraud can also impact the search engine rankings of legitimate websites. The NYC Health + Hospitals breach affected at least 1.8 million people. The theft of biometric information, including fingerprints and palm prints is particularly sensitive.
Recommendation
- Monitor IIS environments for unauthorized traffic redirection and unexpected reverse proxying using network connection logs and web server logs.
- Hunt for the “demo.pdb” strings and associated Chinese-language folder paths within IIS binaries as mentioned in the overview.
- Update endpoint detection solutions to catch reactive evasion tactics employed by the malware.
- Deploy the file hash IOCs to your endpoint detection and response (EDR) and SIEM systems.
- Monitor for the creation of new IIS modules and modifications to existing ones using file integrity monitoring (FIM) solutions and the process_creation category.
Detection coverage 2
Detect IIS Module Load with Chinese Path
mediumDetects loading of IIS modules from directories containing Chinese characters, often associated with BadIIS
Detect BadIIS Malware File Creation
highDetects the creation of files with the specific MD5 hashes associated with prevalent malware files as identified by Talos telemetry.
Detection queries are available on the platform. Get full rules →
Indicators of compromise
3
hash_md5
3
hash_sha256
| Type | Value |
|---|---|
| hash_sha256 | 9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507 |
| hash_md5 | 2915b3f8b703eb744fc54c81f4a9c67f |
| hash_sha256 | d87e8d9d43758ce67a8052cb2334b99cc24f9b0437ee44815f360be0b22d835a |
| hash_md5 | 362498c3e71eeaa066a67e4a3f981d1c |
| hash_sha256 | 9896a6fcb9bb5ac1ec5297b4a65be3f647589adf7c37b45f3f7466decd6a4a7f |
| hash_md5 | 38de5b216c33833af710e88f7f64fc98 |