Operation Rewrite: Chinese-Speaking Threat Actors Deploy BadIIS in a Wide Scale SEO Poisoning Campaign
A Chinese-speaking threat actor conducted a large-scale SEO poisoning campaign dubbed 'Operation Rewrite' using BadIIS malware to manipulate search results. The attackers compromised legitimate websites and used malicious IIS modules to intercept web traffic and serve altered content. The campaign targeted East and Southeast Asia, particularly Vietnam. Multiple variants of BadIIS were discovered, including ASP.NET handlers and PHP scripts. The threat actor is linked to previously known groups like Group 9 and possibly DragonRank. Their toolkit allowed them to inject malicious content, redirect users, and exploit compromised servers for various malicious purposes.
AI Analysis
Technical Summary
Operation Rewrite is a large-scale SEO poisoning campaign attributed to a Chinese-speaking threat actor group linked to previously known entities such as Group 9 and possibly DragonRank. The attackers leveraged BadIIS malware, which consists of malicious IIS modules, ASP.NET handlers, and PHP scripts, to compromise legitimate websites primarily in East and Southeast Asia, with a particular focus on Vietnam. By implanting these malicious modules into web servers running Microsoft IIS, the threat actors intercepted and manipulated web traffic to alter search engine results and redirect users to malicious or fraudulent content. This manipulation of search engine results (SEO poisoning) enables the attackers to increase the visibility of malicious sites or content, potentially leading to further exploitation such as malware distribution, credential theft, or other malicious activities. The campaign's toolkit allows injection of malicious content directly into web pages served by compromised servers, enabling stealthy and persistent manipulation without requiring user interaction beyond visiting affected sites. The use of web shells and various exploitation techniques (referenced by MITRE ATT&CK IDs T1133, T1190, T1112, T1505.003, T1078) indicates a sophisticated approach involving initial access, persistence, and credential access to maintain control over compromised infrastructure. Although no known exploits are currently reported in the wild for this specific malware, the campaign's scale and complexity demonstrate a significant threat to web infrastructure relying on IIS servers, especially those with weak patching or security controls.
Potential Impact
For European organizations, the primary impact of Operation Rewrite lies in the potential compromise of IIS-based web servers, which could lead to unauthorized content manipulation, redirection of legitimate traffic to malicious sites, and subsequent exposure of users to malware or phishing attacks. This can damage organizational reputation, lead to data breaches, and disrupt web services. SEO poisoning can also undermine trust in search results, affecting marketing and customer acquisition efforts. Additionally, compromised servers may be used as footholds for further lateral movement or as platforms for launching additional attacks. While the campaign currently targets East and Southeast Asia, European organizations using IIS infrastructure, especially those with public-facing websites, could be targeted in future operations or collateral damage. The manipulation of web content and redirection can also lead to regulatory and compliance issues under GDPR if personal data is exposed or if users are misled. The medium severity rating reflects the complexity of exploitation and the indirect but significant consequences of compromised web infrastructure.
Mitigation Recommendations
European organizations should implement specific mitigations beyond generic advice: 1) Conduct thorough audits of IIS servers to detect unauthorized modules or handlers, focusing on identifying unusual ASP.NET or PHP scripts that could indicate BadIIS variants. 2) Employ application whitelisting and integrity monitoring to detect unauthorized changes to web server components. 3) Harden IIS configurations by disabling unnecessary modules and enforcing strict access controls on web server file systems and configuration files. 4) Monitor web traffic for anomalies such as unexpected redirects or content injections, using web application firewalls (WAFs) with updated signatures to detect SEO poisoning patterns. 5) Implement multi-factor authentication and credential hygiene to prevent credential theft and lateral movement as indicated by T1078. 6) Regularly update and patch IIS servers and associated web applications to close vulnerabilities exploited for initial access (T1190). 7) Use threat intelligence feeds to monitor for indicators of compromise related to BadIIS and associated threat actor groups. 8) Train security teams to recognize SEO poisoning tactics and conduct incident response drills focused on web server compromises. 9) Restrict administrative access to IIS servers and monitor logs for suspicious activity related to module installation or configuration changes.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- hash: 71671fa8ac26d056939f44ed4737663e
- hash: 798db0dda596904adf3a34d1e6c322b441f324cc
- hash: 01a616e25f1ac661a7a9c244fd31736188ceb5fce8c1a5738e807fdbef70fd60
- hash: 1c870ee30042b1f6387cda8527c2a9cf6791195e63c5126d786f807239bd0ddc
- hash: 22a4f8aead6aef38b0dc26461813499c19c6d9165d375f85fb872cd7d9eba5f9
- hash: 22a9e1675bd8b8d64516bd4be1f07754c8f4ad6c59a965d0e009cbeaca6147a7
- hash: 23aa7c29d1370d31f2631abd7df4c260b85227a433ab3c7d77e8f2d87589948f
- hash: 271c1ddfdfb6ba82c133d1e0aac3981b2c399f16578fcf706f5e332703864656
- hash: 2af61e5acc4ca390d3bd43bc649ab30951ed7b4e36d58a05f5003d92fde5e9a7
- hash: 36bf18c3edd773072d412f4681fb25b1512d0d8a00aac36514cd6c48d80be71b
- hash: 40a0d0ee76b72202b63301a64c948acb3a4da8bac4671c7b7014a6f1e7841bd2
- hash: 5aa684e90dd0b85f41383efe89dddb2d43ecbdaf9c1d52c40a2fdf037fb40138
- hash: 6cff06789bf27407aa420e73123d4892a8f15cae9885ff88749fd21aa6d0e8ad
- hash: 6d044b27cd3418bf949b3db131286c8f877a56d08c3bbb0924baf862a6d13b27
- hash: 6d79b32927bac8020d25aa326ddf44e7d78600714beacd473238cc0d9b5d1ccf
- hash: 78ef67ec600045b7deb8b8ac747845119262bea1d51b2332469b1f769fb0b67d
- hash: 8078fa156f5ab8be073ad3f616a2302f719713aac0f62599916c5084dd326060
- hash: 82096c2716a4de687b3a09b638e39cc7c12959bf380610d5f8f9ac9cddab64d7
- hash: a393b62df62f10c5c16dd98248ee14ca92982e7ac54cb3e1c83124c3623c8c43
- hash: a73c7f833a83025936c52a8f217c9793072d91346bb321552f3214efdeef59eb
- hash: ab0b548931e3e07d466ae8598ca9cd8b10409ab23d471a7124e2e67706a314e8
- hash: b056197f093cd036fa509609d80ece307864806f52ab962901939b45718c18a8
- hash: b95a1619d1ca37d652599b0b0a6188174c71147e9dc7fb4253959bd64c4c1e9f
- hash: bc3bba91572379e81919b9e4d2cbe3b0aa658a97af116e2385b99b610c22c08c
- hash: c5455c43f6a295392cf7db66c68f8c725029f88e089ed01e3de858a114f0764f
- hash: c6622e2900b8112e8157f923e9fcbd48889717adfe1104e07eb253f2e90d2c6a
- hash: d6a0763f6ef19def8a248c875fd4a5ea914737e3914641ef343fe1e51b04f858
- hash: d8a7320e2056daf3ef4d479ff1bb5ce4facda67dfc705e8729aeca78d6f9ca84
- hash: de570369194da3808ab3c3de8fb7ba2aac1cc67680ebdc75348b309e9a290d37
- hash: e2e00fd57d177e4c90c1e6a973cae488782f73378224f54cf1284d69a88b6805
- hash: ed68c5a8c937cd55406c152ae4a2780bf39647f8724029f04e1dce136eb358ea
- ip: 103.6.235.26
- ip: 103.6.235.78
- ip: 160.30.173.87
- domain: 008php.com
- domain: fb88s.icu
- domain: 404.008php.com
- domain: 404.300bt.com
- domain: 404.hao563.com
- domain: 404.hzyzn.com
- domain: 404.pyhycy.com
- domain: 404.yyphw.com
- domain: cs.pyhycy.com
- domain: fcp.yyphw.com
- domain: qp.008php.com
- domain: sl.008php.com
- domain: vn404.008php.com
- domain: www.massnetworks.org
- domain: www.victim.com
- domain: x404.008php.com
Operation Rewrite: Chinese-Speaking Threat Actors Deploy BadIIS in a Wide Scale SEO Poisoning Campaign
Description
A Chinese-speaking threat actor conducted a large-scale SEO poisoning campaign dubbed 'Operation Rewrite' using BadIIS malware to manipulate search results. The attackers compromised legitimate websites and used malicious IIS modules to intercept web traffic and serve altered content. The campaign targeted East and Southeast Asia, particularly Vietnam. Multiple variants of BadIIS were discovered, including ASP.NET handlers and PHP scripts. The threat actor is linked to previously known groups like Group 9 and possibly DragonRank. Their toolkit allowed them to inject malicious content, redirect users, and exploit compromised servers for various malicious purposes.
AI-Powered Analysis
Technical Analysis
Operation Rewrite is a large-scale SEO poisoning campaign attributed to a Chinese-speaking threat actor group linked to previously known entities such as Group 9 and possibly DragonRank. The attackers leveraged BadIIS malware, which consists of malicious IIS modules, ASP.NET handlers, and PHP scripts, to compromise legitimate websites primarily in East and Southeast Asia, with a particular focus on Vietnam. By implanting these malicious modules into web servers running Microsoft IIS, the threat actors intercepted and manipulated web traffic to alter search engine results and redirect users to malicious or fraudulent content. This manipulation of search engine results (SEO poisoning) enables the attackers to increase the visibility of malicious sites or content, potentially leading to further exploitation such as malware distribution, credential theft, or other malicious activities. The campaign's toolkit allows injection of malicious content directly into web pages served by compromised servers, enabling stealthy and persistent manipulation without requiring user interaction beyond visiting affected sites. The use of web shells and various exploitation techniques (referenced by MITRE ATT&CK IDs T1133, T1190, T1112, T1505.003, T1078) indicates a sophisticated approach involving initial access, persistence, and credential access to maintain control over compromised infrastructure. Although no known exploits are currently reported in the wild for this specific malware, the campaign's scale and complexity demonstrate a significant threat to web infrastructure relying on IIS servers, especially those with weak patching or security controls.
Potential Impact
For European organizations, the primary impact of Operation Rewrite lies in the potential compromise of IIS-based web servers, which could lead to unauthorized content manipulation, redirection of legitimate traffic to malicious sites, and subsequent exposure of users to malware or phishing attacks. This can damage organizational reputation, lead to data breaches, and disrupt web services. SEO poisoning can also undermine trust in search results, affecting marketing and customer acquisition efforts. Additionally, compromised servers may be used as footholds for further lateral movement or as platforms for launching additional attacks. While the campaign currently targets East and Southeast Asia, European organizations using IIS infrastructure, especially those with public-facing websites, could be targeted in future operations or collateral damage. The manipulation of web content and redirection can also lead to regulatory and compliance issues under GDPR if personal data is exposed or if users are misled. The medium severity rating reflects the complexity of exploitation and the indirect but significant consequences of compromised web infrastructure.
Mitigation Recommendations
European organizations should implement specific mitigations beyond generic advice: 1) Conduct thorough audits of IIS servers to detect unauthorized modules or handlers, focusing on identifying unusual ASP.NET or PHP scripts that could indicate BadIIS variants. 2) Employ application whitelisting and integrity monitoring to detect unauthorized changes to web server components. 3) Harden IIS configurations by disabling unnecessary modules and enforcing strict access controls on web server file systems and configuration files. 4) Monitor web traffic for anomalies such as unexpected redirects or content injections, using web application firewalls (WAFs) with updated signatures to detect SEO poisoning patterns. 5) Implement multi-factor authentication and credential hygiene to prevent credential theft and lateral movement as indicated by T1078. 6) Regularly update and patch IIS servers and associated web applications to close vulnerabilities exploited for initial access (T1190). 7) Use threat intelligence feeds to monitor for indicators of compromise related to BadIIS and associated threat actor groups. 8) Train security teams to recognize SEO poisoning tactics and conduct incident response drills focused on web server compromises. 9) Restrict administrative access to IIS servers and monitor logs for suspicious activity related to module installation or configuration changes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://unit42.paloaltonetworks.com/operation-rewrite-seo-poisoning-campaign/?pdf=print&lg=en&_wpnonce=8cd08de11a"]
- Adversary
- CL-UNK-1037
- Pulse Id
- 68d2615ca893a861b85e0392
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash71671fa8ac26d056939f44ed4737663e | — | |
hash798db0dda596904adf3a34d1e6c322b441f324cc | — | |
hash01a616e25f1ac661a7a9c244fd31736188ceb5fce8c1a5738e807fdbef70fd60 | — | |
hash1c870ee30042b1f6387cda8527c2a9cf6791195e63c5126d786f807239bd0ddc | — | |
hash22a4f8aead6aef38b0dc26461813499c19c6d9165d375f85fb872cd7d9eba5f9 | — | |
hash22a9e1675bd8b8d64516bd4be1f07754c8f4ad6c59a965d0e009cbeaca6147a7 | — | |
hash23aa7c29d1370d31f2631abd7df4c260b85227a433ab3c7d77e8f2d87589948f | — | |
hash271c1ddfdfb6ba82c133d1e0aac3981b2c399f16578fcf706f5e332703864656 | — | |
hash2af61e5acc4ca390d3bd43bc649ab30951ed7b4e36d58a05f5003d92fde5e9a7 | — | |
hash36bf18c3edd773072d412f4681fb25b1512d0d8a00aac36514cd6c48d80be71b | — | |
hash40a0d0ee76b72202b63301a64c948acb3a4da8bac4671c7b7014a6f1e7841bd2 | — | |
hash5aa684e90dd0b85f41383efe89dddb2d43ecbdaf9c1d52c40a2fdf037fb40138 | — | |
hash6cff06789bf27407aa420e73123d4892a8f15cae9885ff88749fd21aa6d0e8ad | — | |
hash6d044b27cd3418bf949b3db131286c8f877a56d08c3bbb0924baf862a6d13b27 | — | |
hash6d79b32927bac8020d25aa326ddf44e7d78600714beacd473238cc0d9b5d1ccf | — | |
hash78ef67ec600045b7deb8b8ac747845119262bea1d51b2332469b1f769fb0b67d | — | |
hash8078fa156f5ab8be073ad3f616a2302f719713aac0f62599916c5084dd326060 | — | |
hash82096c2716a4de687b3a09b638e39cc7c12959bf380610d5f8f9ac9cddab64d7 | — | |
hasha393b62df62f10c5c16dd98248ee14ca92982e7ac54cb3e1c83124c3623c8c43 | — | |
hasha73c7f833a83025936c52a8f217c9793072d91346bb321552f3214efdeef59eb | — | |
hashab0b548931e3e07d466ae8598ca9cd8b10409ab23d471a7124e2e67706a314e8 | — | |
hashb056197f093cd036fa509609d80ece307864806f52ab962901939b45718c18a8 | — | |
hashb95a1619d1ca37d652599b0b0a6188174c71147e9dc7fb4253959bd64c4c1e9f | — | |
hashbc3bba91572379e81919b9e4d2cbe3b0aa658a97af116e2385b99b610c22c08c | — | |
hashc5455c43f6a295392cf7db66c68f8c725029f88e089ed01e3de858a114f0764f | — | |
hashc6622e2900b8112e8157f923e9fcbd48889717adfe1104e07eb253f2e90d2c6a | — | |
hashd6a0763f6ef19def8a248c875fd4a5ea914737e3914641ef343fe1e51b04f858 | — | |
hashd8a7320e2056daf3ef4d479ff1bb5ce4facda67dfc705e8729aeca78d6f9ca84 | — | |
hashde570369194da3808ab3c3de8fb7ba2aac1cc67680ebdc75348b309e9a290d37 | — | |
hashe2e00fd57d177e4c90c1e6a973cae488782f73378224f54cf1284d69a88b6805 | — | |
hashed68c5a8c937cd55406c152ae4a2780bf39647f8724029f04e1dce136eb358ea | — |
Ip
Value | Description | Copy |
---|---|---|
ip103.6.235.26 | — | |
ip103.6.235.78 | — | |
ip160.30.173.87 | — |
Domain
Value | Description | Copy |
---|---|---|
domain008php.com | — | |
domainfb88s.icu | — | |
domain404.008php.com | — | |
domain404.300bt.com | — | |
domain404.hao563.com | — | |
domain404.hzyzn.com | — | |
domain404.pyhycy.com | — | |
domain404.yyphw.com | — | |
domaincs.pyhycy.com | — | |
domainfcp.yyphw.com | — | |
domainqp.008php.com | — | |
domainsl.008php.com | — | |
domainvn404.008php.com | — | |
domainwww.massnetworks.org | — | |
domainwww.victim.com | — | |
domainx404.008php.com | — |
Threat ID: 68d31564c30b0a5e712e6a58
Added to database: 9/23/2025, 9:47:16 PM
Last enriched: 9/23/2025, 9:47:37 PM
Last updated: 9/24/2025, 2:45:47 AM
Views: 4
Related Threats
Artificial Intelligence Exposes the Homoglyph Hustle
MediumNimbus Manticore Deploys New Malware Targeting Europe
MediumNew Infostealer Campaign Targeting Mac Users via GitHub Pages Claiming to Offer LastPass Premium
MediumModus Operandi of Subtle Snail Espionage Group
MediumDeepens Its Playbook with New Websites and Targets
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.