A recent wave of cyberattacks has revealed that cybercriminals are exploiting Microsoft Internet Information Services (IIS) servers to deploy the BadIIS malware. This campaign, attributed to Chinese-speaking threat actors, manipulates search engine optimization (SEO) rankings and distributes malicious content. The attackers primarily target organizations across Asia, including India, Thailand, and Vietnam, with possible spillover into other regions. They inject malware that alters HTTP responses, which allows them to manipulate web content, serve unauthorized ads, and redirect users to phishing websites or illegal gambling platforms. This attack not only threatens the integrity of legitimate web services but also exposes users to significant cybersecurity risks. IIS servers are an attractive target for cybercriminals because of their modular architecture, which allows easy integration of additional functionalities. The BadIIS malware has two modes of operation: SEO Fraud Mode, which captures HTTP headers and forces users to a fraudulent site, and Injector Mode, which injects malicious JavaScript into HTTP responses, forcing the user to domains controlled by attackers. The deployment of the malware is through exploiting unpatched IIS vulnerabilities, and through analysis by Trend Micro, this attack is connected to Chinese-speaking groups through specific domain names, coding patterns, and automated batch scripts used for persistence. This attack is an example of the dire consequences of weak server security across many sectors, including government institutions, universities, and technology companies. To combat this threat, organizations that utilize IIS servers need to take proactive measures against cyber threats. IIS servers should be regularly updated and patched to close known vulnerabilities. Unusual activity, such as unexpected module installations or changes in server behavior, should be monitored to identify potential threats. Organisations should require strong passwords, multi-factor authentications, and restrict administrative access to limit their risk factor. In addition to this, through positioning firewalls in strategic points where network traffic is filtered, continuous log analysis can determine suspicious activity. As cybercriminals remain innovative, it means that security practices must be constantly improved to protect the web infrastructure from emerging threats like BadIIS.
A critical vulnerability in nginx-ui, a web-based Nginx management tool, is being actively exploited in the wild. Identified as CVE-2026-33032 with a CVSS rating of 9.8, this vulne...
Cisco has released a security advisory addressing two newly identified vulnerabilities affecting its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC). Th...
Attackers have breached the n8n workflow automation platform through the delivery of a malware npm package under the guise of a legitimate integration. The threat actors carried ou...