BADIIS to the Bone: New Insights to a Global SEO Poisoning Campaign
A Chinese-speaking cybercrime group, REF4033, has orchestrated a massive SEO poisoning campaign, compromising over 1,800 Windows web servers worldwide using the BADIIS malware. The campaign operates in two phases: serving keyword-stuffed HTML to search engine crawlers and redirecting victims to illicit websites. The group deploys BADIIS, a malicious IIS module, to hijack legitimate servers for manipulating search engine rankings and facilitating financial fraud. The campaign primarily targets the APAC region, with China and Vietnam accounting for 82% of compromised servers. Victims span various sectors, including government agencies, educational institutions, and financial services. The attackers use sophisticated techniques for stealth and anti-tampering, employing Chinese encryption standards and commercial obfuscation tools.
AI Analysis
Technical Summary
The BADIIS campaign is a sophisticated global SEO poisoning operation orchestrated by the Chinese-speaking cybercrime group REF4033. It compromises over 1,800 Windows web servers worldwide by deploying a malicious IIS module named BADIIS. This malware operates in two distinct phases: first, it serves keyword-stuffed HTML content exclusively to search engine crawlers to manipulate search rankings and boost visibility of illicit websites. Second, it redirects actual users visiting the compromised servers to fraudulent or malicious websites, facilitating financial fraud and potentially other vice economy activities. The campaign predominantly targets the APAC region, with China and Vietnam accounting for 82% of infected servers, but victims span multiple sectors globally, including government agencies, educational institutions, and financial services. The attackers use advanced stealth and anti-tampering techniques, including Chinese encryption standards and commercial obfuscation tools, to maintain persistence and evade detection. The malware’s integration as an IIS module allows deep manipulation of web server responses, making detection challenging. Although no known exploits are publicly documented, the campaign’s scale and sophistication indicate a well-resourced adversary focused on search engine manipulation to drive traffic to illicit sites. The lack of patch links suggests no direct software vulnerability is exploited; rather, the infection vector likely involves server compromise through other means such as credential theft or exploitation of unpatched IIS configurations. This threat undermines the integrity of web services, damages user trust, and can cause financial and reputational harm to affected organizations.
Potential Impact
For European organizations, the BADIIS campaign presents several risks despite its primary focus on the APAC region. Organizations running IIS web servers that are publicly accessible and indexed by search engines could be targeted or indirectly affected through supply chain contamination or SEO manipulation. Compromise of government, educational, or financial sector web servers could lead to reputational damage, loss of user trust, and potential financial fraud against users redirected to malicious sites. The manipulation of search engine results can degrade the quality of search traffic, impacting marketing and operational effectiveness. Additionally, the stealthy nature of the malware and its use of encryption and obfuscation complicate detection and remediation efforts. European organizations may also face regulatory and compliance risks if compromised servers are used to facilitate fraud or distribute illicit content. The campaign’s focus on financial fraud aligns with critical sectors in Europe, increasing the potential impact on economic stability and public trust. Overall, while direct infection rates in Europe may currently be lower, the threat’s global scale and sophisticated tactics warrant proactive defense measures.
Mitigation Recommendations
To mitigate the BADIIS threat, European organizations should implement the following specific measures: 1) Conduct thorough audits of IIS web servers to detect unauthorized modules or unusual configurations, using specialized tools capable of identifying malicious IIS modules like BADIIS. 2) Monitor web server logs and network traffic for anomalies such as unexpected redirects or unusual user-agent strings indicative of SEO poisoning activities. 3) Harden IIS server configurations by disabling unnecessary modules, enforcing strict access controls, and applying the latest security patches to the underlying OS and IIS components. 4) Employ endpoint detection and response (EDR) solutions with capabilities to detect obfuscated malware and suspicious encryption usage. 5) Implement multi-factor authentication and strong credential management to prevent initial compromise vectors such as credential theft. 6) Collaborate with search engine providers to report and remediate manipulated search results and poisoned SEO content. 7) Educate web administrators and security teams about the tactics used by REF4033 to improve incident response readiness. 8) Regularly back up web server configurations and content to enable rapid recovery in case of compromise. 9) Use web application firewalls (WAFs) to filter malicious requests and prevent unauthorized module installations. 10) Engage in threat intelligence sharing with industry peers and national cybersecurity centers to stay informed about emerging indicators of compromise related to BADIIS.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
Indicators of Compromise
- url: http://kr.gotz001.com/lunlian/index.php
- url: http://se.gotz001.com/lunlian/index.php
- url: https://cn404.gotz001.com/lunlian/index.php
- url: https://cnse.gotz001.com/lunlian/index.php
- hash: 02d1c2e512552ad5c9ff1e99e13beec1
- hash: 039344cb9bd8fa712983e1753d8391e9
- hash: 1e4b23eee1b96b0cc705da1e7fb9e2f3
- hash: 26b9279a1a29e101dc4912ec90c05810
- hash: 4a9f14b9da4973e46a1e28779fef6e15
- hash: 68b09f69a7c14caaf52661568d51f6b7
- hash: 6f39be4f6446ed6c399acde5a25711a8
- hash: b59ff1638e92ab1127b7bc76c7922245
- hash: e4d6216403e24260b5f51b394899c0f1
- hash: 2060fe0d06d4409e301ff3d287bfa25ca7bdbe97
- hash: 9371de709d9e61ba6b6cf479298734ff37c4d95f
- hash: ac728e098df054bbd4b3f68332bd74b9f839ec90
- hash: bf3863773390dfa6b704bee661237e04a3c39ab2
- hash: d369986480be6461bfe0c51db846858c878f76bd
- hash: e15c61eba9565dc15b0472b42023e9dc3f8c57b6
- hash: f9b970d7b4d948592f3fd060f966e8c0558112a5
- hash: 055bdcaa0b69a1e205c931547ef863531e9fdfdaac93aaea29fb701c7b468294
- hash: 1b723a5f9725b607926e925d1797f7ec9664bb308c9602002345485e18085b72
- hash: 1f9e694cac70d089f549d7adf91513f0f7e1d4ef212979aad67a5aea10c6d016
- hash: 2340f152e8cb4cc7d5d15f384517d756a098283aef239f8cbfe3d91f8722800a
- hash: 7f2987e49211ff265378349ea648498042cd0817e131da41156d4eafee4310ca
- hash: c2ff48cfa38598ad514466673b506e377839d25d5dfb1c3d88908c231112d1b2
- hash: c5abe6936fe111bbded1757a90c934a9e18d849edd70e56a451c1547688ff96f
- url: http://bd.gotz001.com/lunlian/index.php
- url: http://kr.gotz003.com/krfml/krfmldz.txt
- url: http://kr.gotz003.com/krfml/krfmlip.txt
- url: http://kr.gotz003.com/krfml/krfmllj.txt
- url: http://kr.gotz003.com/krfml/krfmltz.txt
- url: http://vn.jbtz001.com/lunlian/index.php
- url: https://br.jbtz001.com/lunlian/index.php
- url: https://cn.gotz001.com/lunlian/index.php
- url: https://cn.gotz001.com/lunlian/indexgov.php
- url: https://cn.jbtz001.com/lunlian/index.php
- url: https://in.jbtz001.com/lunlian/index.php
- url: https://jp.jbtz001.com/lunlian/index.php
- url: https://pk.jbtz001.com/lunlian/index.php
- url: https://vn.gotz001.com/lunlian/index.php
- url: https://vn404.gotz001.com/lunlian/index.php
- url: https://vnbtc.jbtz001.com/lunlian/index.php
- url: https://vnse.jbtz001.com/lunlian/index.php
- domain: gotz001.com
- domain: gotz003.com
- domain: jbtz001.com
- domain: jbtz003.com
- domain: uupbit.top
- domain: bd.gotz001.com
- domain: bd.gotz003.com
- domain: br.jbtz001.com
- domain: br.jbtz003.com
- domain: cn.gotz001.com
- domain: cn.gotz003.com
- domain: cn.jbtz001.com
- domain: cn.jbtz003.com
- domain: cn404.gotz001.com
- domain: cnse.gotz001.com
- domain: cnse.gotz003.com
- domain: in.jbtz001.com
- domain: in.jbtz003.com
- domain: jp.jbtz001.com
- domain: jp.jbtz003.com
- domain: kr.gotz001.com
- domain: kr.gotz003.com
- domain: pk.jbtz001.com
- domain: pk.jbtz003.com
- domain: se.gotz001.com
- domain: vn.gotz001.com
- domain: vn.gotz003.com
- domain: vn.jbtz001.com
- domain: vn.jbtz003.com
- domain: vn404.gotz001.com
- domain: vnbtc.jbtz001.com
- domain: vnbtc.jbtz003.com
- domain: vnse.jbtz001.com
- domain: wsmres64.idx2.sc
BADIIS to the Bone: New Insights to a Global SEO Poisoning Campaign
Description
A Chinese-speaking cybercrime group, REF4033, has orchestrated a massive SEO poisoning campaign, compromising over 1,800 Windows web servers worldwide using the BADIIS malware. The campaign operates in two phases: serving keyword-stuffed HTML to search engine crawlers and redirecting victims to illicit websites. The group deploys BADIIS, a malicious IIS module, to hijack legitimate servers for manipulating search engine rankings and facilitating financial fraud. The campaign primarily targets the APAC region, with China and Vietnam accounting for 82% of compromised servers. Victims span various sectors, including government agencies, educational institutions, and financial services. The attackers use sophisticated techniques for stealth and anti-tampering, employing Chinese encryption standards and commercial obfuscation tools.
AI-Powered Analysis
Technical Analysis
The BADIIS campaign is a sophisticated global SEO poisoning operation orchestrated by the Chinese-speaking cybercrime group REF4033. It compromises over 1,800 Windows web servers worldwide by deploying a malicious IIS module named BADIIS. This malware operates in two distinct phases: first, it serves keyword-stuffed HTML content exclusively to search engine crawlers to manipulate search rankings and boost visibility of illicit websites. Second, it redirects actual users visiting the compromised servers to fraudulent or malicious websites, facilitating financial fraud and potentially other vice economy activities. The campaign predominantly targets the APAC region, with China and Vietnam accounting for 82% of infected servers, but victims span multiple sectors globally, including government agencies, educational institutions, and financial services. The attackers use advanced stealth and anti-tampering techniques, including Chinese encryption standards and commercial obfuscation tools, to maintain persistence and evade detection. The malware’s integration as an IIS module allows deep manipulation of web server responses, making detection challenging. Although no known exploits are publicly documented, the campaign’s scale and sophistication indicate a well-resourced adversary focused on search engine manipulation to drive traffic to illicit sites. The lack of patch links suggests no direct software vulnerability is exploited; rather, the infection vector likely involves server compromise through other means such as credential theft or exploitation of unpatched IIS configurations. This threat undermines the integrity of web services, damages user trust, and can cause financial and reputational harm to affected organizations.
Potential Impact
For European organizations, the BADIIS campaign presents several risks despite its primary focus on the APAC region. Organizations running IIS web servers that are publicly accessible and indexed by search engines could be targeted or indirectly affected through supply chain contamination or SEO manipulation. Compromise of government, educational, or financial sector web servers could lead to reputational damage, loss of user trust, and potential financial fraud against users redirected to malicious sites. The manipulation of search engine results can degrade the quality of search traffic, impacting marketing and operational effectiveness. Additionally, the stealthy nature of the malware and its use of encryption and obfuscation complicate detection and remediation efforts. European organizations may also face regulatory and compliance risks if compromised servers are used to facilitate fraud or distribute illicit content. The campaign’s focus on financial fraud aligns with critical sectors in Europe, increasing the potential impact on economic stability and public trust. Overall, while direct infection rates in Europe may currently be lower, the threat’s global scale and sophisticated tactics warrant proactive defense measures.
Mitigation Recommendations
To mitigate the BADIIS threat, European organizations should implement the following specific measures: 1) Conduct thorough audits of IIS web servers to detect unauthorized modules or unusual configurations, using specialized tools capable of identifying malicious IIS modules like BADIIS. 2) Monitor web server logs and network traffic for anomalies such as unexpected redirects or unusual user-agent strings indicative of SEO poisoning activities. 3) Harden IIS server configurations by disabling unnecessary modules, enforcing strict access controls, and applying the latest security patches to the underlying OS and IIS components. 4) Employ endpoint detection and response (EDR) solutions with capabilities to detect obfuscated malware and suspicious encryption usage. 5) Implement multi-factor authentication and strong credential management to prevent initial compromise vectors such as credential theft. 6) Collaborate with search engine providers to report and remediate manipulated search results and poisoned SEO content. 7) Educate web administrators and security teams about the tactics used by REF4033 to improve incident response readiness. 8) Regularly back up web server configurations and content to enable rapid recovery in case of compromise. 9) Use web application firewalls (WAFs) to filter malicious requests and prevent unauthorized module installations. 10) Engage in threat intelligence sharing with industry peers and national cybersecurity centers to stay informed about emerging indicators of compromise related to BADIIS.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.elastic.co/security-labs/badiis-to-the-bone-new-insights-to-global-seo-poisoning-campaign"]
- Adversary
- REF4033
- Pulse Id
- 6994ac79976f1ab4e955ca2b
- Threat Score
- null
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://kr.gotz001.com/lunlian/index.php | — | |
urlhttp://se.gotz001.com/lunlian/index.php | — | |
urlhttps://cn404.gotz001.com/lunlian/index.php | — | |
urlhttps://cnse.gotz001.com/lunlian/index.php | — | |
urlhttp://bd.gotz001.com/lunlian/index.php | — | |
urlhttp://kr.gotz003.com/krfml/krfmldz.txt | — | |
urlhttp://kr.gotz003.com/krfml/krfmlip.txt | — | |
urlhttp://kr.gotz003.com/krfml/krfmllj.txt | — | |
urlhttp://kr.gotz003.com/krfml/krfmltz.txt | — | |
urlhttp://vn.jbtz001.com/lunlian/index.php | — | |
urlhttps://br.jbtz001.com/lunlian/index.php | — | |
urlhttps://cn.gotz001.com/lunlian/index.php | — | |
urlhttps://cn.gotz001.com/lunlian/indexgov.php | — | |
urlhttps://cn.jbtz001.com/lunlian/index.php | — | |
urlhttps://in.jbtz001.com/lunlian/index.php | — | |
urlhttps://jp.jbtz001.com/lunlian/index.php | — | |
urlhttps://pk.jbtz001.com/lunlian/index.php | — | |
urlhttps://vn.gotz001.com/lunlian/index.php | — | |
urlhttps://vn404.gotz001.com/lunlian/index.php | — | |
urlhttps://vnbtc.jbtz001.com/lunlian/index.php | — | |
urlhttps://vnse.jbtz001.com/lunlian/index.php | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash02d1c2e512552ad5c9ff1e99e13beec1 | — | |
hash039344cb9bd8fa712983e1753d8391e9 | — | |
hash1e4b23eee1b96b0cc705da1e7fb9e2f3 | — | |
hash26b9279a1a29e101dc4912ec90c05810 | — | |
hash4a9f14b9da4973e46a1e28779fef6e15 | — | |
hash68b09f69a7c14caaf52661568d51f6b7 | — | |
hash6f39be4f6446ed6c399acde5a25711a8 | — | |
hashb59ff1638e92ab1127b7bc76c7922245 | — | |
hashe4d6216403e24260b5f51b394899c0f1 | — | |
hash2060fe0d06d4409e301ff3d287bfa25ca7bdbe97 | — | |
hash9371de709d9e61ba6b6cf479298734ff37c4d95f | — | |
hashac728e098df054bbd4b3f68332bd74b9f839ec90 | — | |
hashbf3863773390dfa6b704bee661237e04a3c39ab2 | — | |
hashd369986480be6461bfe0c51db846858c878f76bd | — | |
hashe15c61eba9565dc15b0472b42023e9dc3f8c57b6 | — | |
hashf9b970d7b4d948592f3fd060f966e8c0558112a5 | — | |
hash055bdcaa0b69a1e205c931547ef863531e9fdfdaac93aaea29fb701c7b468294 | — | |
hash1b723a5f9725b607926e925d1797f7ec9664bb308c9602002345485e18085b72 | — | |
hash1f9e694cac70d089f549d7adf91513f0f7e1d4ef212979aad67a5aea10c6d016 | — | |
hash2340f152e8cb4cc7d5d15f384517d756a098283aef239f8cbfe3d91f8722800a | — | |
hash7f2987e49211ff265378349ea648498042cd0817e131da41156d4eafee4310ca | — | |
hashc2ff48cfa38598ad514466673b506e377839d25d5dfb1c3d88908c231112d1b2 | — | |
hashc5abe6936fe111bbded1757a90c934a9e18d849edd70e56a451c1547688ff96f | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaingotz001.com | — | |
domaingotz003.com | — | |
domainjbtz001.com | — | |
domainjbtz003.com | — | |
domainuupbit.top | — | |
domainbd.gotz001.com | — | |
domainbd.gotz003.com | — | |
domainbr.jbtz001.com | — | |
domainbr.jbtz003.com | — | |
domaincn.gotz001.com | — | |
domaincn.gotz003.com | — | |
domaincn.jbtz001.com | — | |
domaincn.jbtz003.com | — | |
domaincn404.gotz001.com | — | |
domaincnse.gotz001.com | — | |
domaincnse.gotz003.com | — | |
domainin.jbtz001.com | — | |
domainin.jbtz003.com | — | |
domainjp.jbtz001.com | — | |
domainjp.jbtz003.com | — | |
domainkr.gotz001.com | — | |
domainkr.gotz003.com | — | |
domainpk.jbtz001.com | — | |
domainpk.jbtz003.com | — | |
domainse.gotz001.com | — | |
domainvn.gotz001.com | — | |
domainvn.gotz003.com | — | |
domainvn.jbtz001.com | — | |
domainvn.jbtz003.com | — | |
domainvn404.gotz001.com | — | |
domainvnbtc.jbtz001.com | — | |
domainvnbtc.jbtz003.com | — | |
domainvnse.jbtz001.com | — | |
domainwsmres64.idx2.sc | — |
Threat ID: 6994b74a80d747be20cdd527
Added to database: 2/17/2026, 6:45:30 PM
Last enriched: 2/17/2026, 7:00:28 PM
Last updated: 2/21/2026, 12:23:20 AM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-20
MediumAndroid threats using GenAI usher in a new era
MediumMaltrail IOC for 2026-02-20
MediumFBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025
MediumPromptSpy Android Malware Abuses Gemini AI at Runtime for Persistence
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.