Skip to content
Threat Feed
medium advisory

BadIIS Malware-as-a-Service Ecosystem Targeting IIS Servers

A commodity BadIIS malware variant is fueling a thriving malware-as-a-service (MaaS) ecosystem for Chinese-speaking cybercrime groups, allowing them to execute malicious SEO fraud, hijack server content, and redirect traffic to illicit sites.

A new commodity BadIIS malware variant has been discovered fueling a malware-as-a-service (MaaS) ecosystem targeting IIS servers. This toolset, identifiable by its embedded “demo.pdb” strings, has undergone multi-year development with builder tools and persistence mechanisms. Chinese-speaking cybercrime groups are leveraging this framework to perform malicious search engine optimization (SEO) fraud, hijack server content, and redirect traffic to illicit sites. The malware author constantly pushes rapid updates to introduce new features and evade security vendors, making it a persistent threat. This BadIIS variant lowers the barrier to entry for cybercriminals, leading to widespread attacks that silently hijack server traffic.

Attack Chain

  1. The attacker gains initial access to the target IIS server through unknown means.
  2. The attacker deploys the BadIIS malware, often utilizing Chinese-language folder paths, onto the compromised server.
  3. The BadIIS malware installs itself as an IIS module, allowing it to intercept and modify HTTP requests.
  4. The malware configures traffic redirection rules, redirecting legitimate user traffic to attacker-controlled illicit sites.
  5. The malware performs malicious SEO fraud by injecting hidden keywords and links into server content, boosting the ranking of malicious websites.
  6. The BadIIS malware is updated with reactive evasion tactics to avoid detection by security vendors.
  7. The attacker monitors the hijacked traffic and SEO performance, making adjustments to maximize profits.
  8. The attacker maintains persistence on the compromised server for continued operation and potential further exploitation.

Impact

Compromised IIS servers are silently redirected to illicit sites, leading to financial losses for victims and reputational damage for server owners. The malware’s ability to perform SEO fraud can also impact the search engine rankings of legitimate websites. The NYC Health + Hospitals breach affected at least 1.8 million people. The theft of biometric information, including fingerprints and palm prints is particularly sensitive.

Recommendation

  • Monitor IIS environments for unauthorized traffic redirection and unexpected reverse proxying using network connection logs and web server logs.
  • Hunt for the “demo.pdb” strings and associated Chinese-language folder paths within IIS binaries as mentioned in the overview.
  • Update endpoint detection solutions to catch reactive evasion tactics employed by the malware.
  • Deploy the file hash IOCs to your endpoint detection and response (EDR) and SIEM systems.
  • Monitor for the creation of new IIS modules and modifications to existing ones using file integrity monitoring (FIM) solutions and the process_creation category.

Detection coverage 2

Detect IIS Module Load with Chinese Path

medium

Detects loading of IIS modules from directories containing Chinese characters, often associated with BadIIS

sigma tactics: persistence techniques: T1547.001 sources: image_load, windows

Detect BadIIS Malware File Creation

high

Detects the creation of files with the specific MD5 hashes associated with prevalent malware files as identified by Talos telemetry.

sigma tactics: initial_access techniques: T1566 sources: file_event, windows

Detection queries are available on the platform. Get full rules →

Indicators of compromise

3

hash_md5

3

hash_sha256

TypeValue
hash_sha2569f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507
hash_md52915b3f8b703eb744fc54c81f4a9c67f
hash_sha256d87e8d9d43758ce67a8052cb2334b99cc24f9b0437ee44815f360be0b22d835a
hash_md5362498c3e71eeaa066a67e4a3f981d1c
hash_sha2569896a6fcb9bb5ac1ec5297b4a65be3f647589adf7c37b45f3f7466decd6a4a7f
hash_md538de5b216c33833af710e88f7f64fc98