Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

BADIIS to the Bone: New Insights to a Global SEO Poisoning Campaign

0
Medium
Published: Tue Feb 17 2026 (02/17/2026, 17:59:21 UTC)
Source: AlienVault OTX General

Description

A Chinese-speaking cybercrime group, REF4033, has orchestrated a massive SEO poisoning campaign, compromising over 1,800 Windows web servers worldwide using the BADIIS malware. The campaign operates in two phases: serving keyword-stuffed HTML to search engine crawlers and redirecting victims to illicit websites. The group deploys BADIIS, a malicious IIS module, to hijack legitimate servers for manipulating search engine rankings and facilitating financial fraud. The campaign primarily targets the APAC region, with China and Vietnam accounting for 82% of compromised servers. Victims span various sectors, including government agencies, educational institutions, and financial services. The attackers use sophisticated techniques for stealth and anti-tampering, employing Chinese encryption standards and commercial obfuscation tools.

AI-Powered Analysis

AILast updated: 02/17/2026, 19:00:28 UTC

Technical Analysis

The BADIIS campaign is a sophisticated global SEO poisoning operation orchestrated by the Chinese-speaking cybercrime group REF4033. It compromises over 1,800 Windows web servers worldwide by deploying a malicious IIS module named BADIIS. This malware operates in two distinct phases: first, it serves keyword-stuffed HTML content exclusively to search engine crawlers to manipulate search rankings and boost visibility of illicit websites. Second, it redirects actual users visiting the compromised servers to fraudulent or malicious websites, facilitating financial fraud and potentially other vice economy activities. The campaign predominantly targets the APAC region, with China and Vietnam accounting for 82% of infected servers, but victims span multiple sectors globally, including government agencies, educational institutions, and financial services. The attackers use advanced stealth and anti-tampering techniques, including Chinese encryption standards and commercial obfuscation tools, to maintain persistence and evade detection. The malware’s integration as an IIS module allows deep manipulation of web server responses, making detection challenging. Although no known exploits are publicly documented, the campaign’s scale and sophistication indicate a well-resourced adversary focused on search engine manipulation to drive traffic to illicit sites. The lack of patch links suggests no direct software vulnerability is exploited; rather, the infection vector likely involves server compromise through other means such as credential theft or exploitation of unpatched IIS configurations. This threat undermines the integrity of web services, damages user trust, and can cause financial and reputational harm to affected organizations.

Potential Impact

For European organizations, the BADIIS campaign presents several risks despite its primary focus on the APAC region. Organizations running IIS web servers that are publicly accessible and indexed by search engines could be targeted or indirectly affected through supply chain contamination or SEO manipulation. Compromise of government, educational, or financial sector web servers could lead to reputational damage, loss of user trust, and potential financial fraud against users redirected to malicious sites. The manipulation of search engine results can degrade the quality of search traffic, impacting marketing and operational effectiveness. Additionally, the stealthy nature of the malware and its use of encryption and obfuscation complicate detection and remediation efforts. European organizations may also face regulatory and compliance risks if compromised servers are used to facilitate fraud or distribute illicit content. The campaign’s focus on financial fraud aligns with critical sectors in Europe, increasing the potential impact on economic stability and public trust. Overall, while direct infection rates in Europe may currently be lower, the threat’s global scale and sophisticated tactics warrant proactive defense measures.

Mitigation Recommendations

To mitigate the BADIIS threat, European organizations should implement the following specific measures: 1) Conduct thorough audits of IIS web servers to detect unauthorized modules or unusual configurations, using specialized tools capable of identifying malicious IIS modules like BADIIS. 2) Monitor web server logs and network traffic for anomalies such as unexpected redirects or unusual user-agent strings indicative of SEO poisoning activities. 3) Harden IIS server configurations by disabling unnecessary modules, enforcing strict access controls, and applying the latest security patches to the underlying OS and IIS components. 4) Employ endpoint detection and response (EDR) solutions with capabilities to detect obfuscated malware and suspicious encryption usage. 5) Implement multi-factor authentication and strong credential management to prevent initial compromise vectors such as credential theft. 6) Collaborate with search engine providers to report and remediate manipulated search results and poisoned SEO content. 7) Educate web administrators and security teams about the tactics used by REF4033 to improve incident response readiness. 8) Regularly back up web server configurations and content to enable rapid recovery in case of compromise. 9) Use web application firewalls (WAFs) to filter malicious requests and prevent unauthorized module installations. 10) Engage in threat intelligence sharing with industry peers and national cybersecurity centers to stay informed about emerging indicators of compromise related to BADIIS.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.elastic.co/security-labs/badiis-to-the-bone-new-insights-to-global-seo-poisoning-campaign"]
Adversary
REF4033
Pulse Id
6994ac79976f1ab4e955ca2b
Threat Score
null

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttp://kr.gotz001.com/lunlian/index.php
urlhttp://se.gotz001.com/lunlian/index.php
urlhttps://cn404.gotz001.com/lunlian/index.php
urlhttps://cnse.gotz001.com/lunlian/index.php
urlhttp://bd.gotz001.com/lunlian/index.php
urlhttp://kr.gotz003.com/krfml/krfmldz.txt
urlhttp://kr.gotz003.com/krfml/krfmlip.txt
urlhttp://kr.gotz003.com/krfml/krfmllj.txt
urlhttp://kr.gotz003.com/krfml/krfmltz.txt
urlhttp://vn.jbtz001.com/lunlian/index.php
urlhttps://br.jbtz001.com/lunlian/index.php
urlhttps://cn.gotz001.com/lunlian/index.php
urlhttps://cn.gotz001.com/lunlian/indexgov.php
urlhttps://cn.jbtz001.com/lunlian/index.php
urlhttps://in.jbtz001.com/lunlian/index.php
urlhttps://jp.jbtz001.com/lunlian/index.php
urlhttps://pk.jbtz001.com/lunlian/index.php
urlhttps://vn.gotz001.com/lunlian/index.php
urlhttps://vn404.gotz001.com/lunlian/index.php
urlhttps://vnbtc.jbtz001.com/lunlian/index.php
urlhttps://vnse.jbtz001.com/lunlian/index.php

Hash

ValueDescriptionCopy
hash02d1c2e512552ad5c9ff1e99e13beec1
hash039344cb9bd8fa712983e1753d8391e9
hash1e4b23eee1b96b0cc705da1e7fb9e2f3
hash26b9279a1a29e101dc4912ec90c05810
hash4a9f14b9da4973e46a1e28779fef6e15
hash68b09f69a7c14caaf52661568d51f6b7
hash6f39be4f6446ed6c399acde5a25711a8
hashb59ff1638e92ab1127b7bc76c7922245
hashe4d6216403e24260b5f51b394899c0f1
hash2060fe0d06d4409e301ff3d287bfa25ca7bdbe97
hash9371de709d9e61ba6b6cf479298734ff37c4d95f
hashac728e098df054bbd4b3f68332bd74b9f839ec90
hashbf3863773390dfa6b704bee661237e04a3c39ab2
hashd369986480be6461bfe0c51db846858c878f76bd
hashe15c61eba9565dc15b0472b42023e9dc3f8c57b6
hashf9b970d7b4d948592f3fd060f966e8c0558112a5
hash055bdcaa0b69a1e205c931547ef863531e9fdfdaac93aaea29fb701c7b468294
hash1b723a5f9725b607926e925d1797f7ec9664bb308c9602002345485e18085b72
hash1f9e694cac70d089f549d7adf91513f0f7e1d4ef212979aad67a5aea10c6d016
hash2340f152e8cb4cc7d5d15f384517d756a098283aef239f8cbfe3d91f8722800a
hash7f2987e49211ff265378349ea648498042cd0817e131da41156d4eafee4310ca
hashc2ff48cfa38598ad514466673b506e377839d25d5dfb1c3d88908c231112d1b2
hashc5abe6936fe111bbded1757a90c934a9e18d849edd70e56a451c1547688ff96f

Domain

ValueDescriptionCopy
domaingotz001.com
domaingotz003.com
domainjbtz001.com
domainjbtz003.com
domainuupbit.top
domainbd.gotz001.com
domainbd.gotz003.com
domainbr.jbtz001.com
domainbr.jbtz003.com
domaincn.gotz001.com
domaincn.gotz003.com
domaincn.jbtz001.com
domaincn.jbtz003.com
domaincn404.gotz001.com
domaincnse.gotz001.com
domaincnse.gotz003.com
domainin.jbtz001.com
domainin.jbtz003.com
domainjp.jbtz001.com
domainjp.jbtz003.com
domainkr.gotz001.com
domainkr.gotz003.com
domainpk.jbtz001.com
domainpk.jbtz003.com
domainse.gotz001.com
domainvn.gotz001.com
domainvn.gotz003.com
domainvn.jbtz001.com
domainvn.jbtz003.com
domainvn404.gotz001.com
domainvnbtc.jbtz001.com
domainvnbtc.jbtz003.com
domainvnse.jbtz001.com
domainwsmres64.idx2.sc

Threat ID: 6994b74a80d747be20cdd527

Added to database: 2/17/2026, 6:45:30 PM

Last enriched: 2/17/2026, 7:00:28 PM

Last updated: 2/21/2026, 12:23:20 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats