Skip to main content

Operation Rewrite: Chinese-Speaking Threat Actors Deploy BadIIS in a Wide Scale SEO Poisoning Campaign

Medium
Published: Tue Sep 23 2025 (09/23/2025, 08:59:08 UTC)
Source: AlienVault OTX General

Description

A Chinese-speaking threat actor conducted a large-scale SEO poisoning campaign dubbed 'Operation Rewrite' using BadIIS malware to manipulate search results. The attackers compromised legitimate websites and used malicious IIS modules to intercept web traffic and serve altered content. The campaign targeted East and Southeast Asia, particularly Vietnam. Multiple variants of BadIIS were discovered, including ASP.NET handlers and PHP scripts. The threat actor is linked to previously known groups like Group 9 and possibly DragonRank. Their toolkit allowed them to inject malicious content, redirect users, and exploit compromised servers for various malicious purposes.

AI-Powered Analysis

AILast updated: 09/23/2025, 21:47:37 UTC

Technical Analysis

Operation Rewrite is a large-scale SEO poisoning campaign attributed to a Chinese-speaking threat actor group linked to previously known entities such as Group 9 and possibly DragonRank. The attackers leveraged BadIIS malware, which consists of malicious IIS modules, ASP.NET handlers, and PHP scripts, to compromise legitimate websites primarily in East and Southeast Asia, with a particular focus on Vietnam. By implanting these malicious modules into web servers running Microsoft IIS, the threat actors intercepted and manipulated web traffic to alter search engine results and redirect users to malicious or fraudulent content. This manipulation of search engine results (SEO poisoning) enables the attackers to increase the visibility of malicious sites or content, potentially leading to further exploitation such as malware distribution, credential theft, or other malicious activities. The campaign's toolkit allows injection of malicious content directly into web pages served by compromised servers, enabling stealthy and persistent manipulation without requiring user interaction beyond visiting affected sites. The use of web shells and various exploitation techniques (referenced by MITRE ATT&CK IDs T1133, T1190, T1112, T1505.003, T1078) indicates a sophisticated approach involving initial access, persistence, and credential access to maintain control over compromised infrastructure. Although no known exploits are currently reported in the wild for this specific malware, the campaign's scale and complexity demonstrate a significant threat to web infrastructure relying on IIS servers, especially those with weak patching or security controls.

Potential Impact

For European organizations, the primary impact of Operation Rewrite lies in the potential compromise of IIS-based web servers, which could lead to unauthorized content manipulation, redirection of legitimate traffic to malicious sites, and subsequent exposure of users to malware or phishing attacks. This can damage organizational reputation, lead to data breaches, and disrupt web services. SEO poisoning can also undermine trust in search results, affecting marketing and customer acquisition efforts. Additionally, compromised servers may be used as footholds for further lateral movement or as platforms for launching additional attacks. While the campaign currently targets East and Southeast Asia, European organizations using IIS infrastructure, especially those with public-facing websites, could be targeted in future operations or collateral damage. The manipulation of web content and redirection can also lead to regulatory and compliance issues under GDPR if personal data is exposed or if users are misled. The medium severity rating reflects the complexity of exploitation and the indirect but significant consequences of compromised web infrastructure.

Mitigation Recommendations

European organizations should implement specific mitigations beyond generic advice: 1) Conduct thorough audits of IIS servers to detect unauthorized modules or handlers, focusing on identifying unusual ASP.NET or PHP scripts that could indicate BadIIS variants. 2) Employ application whitelisting and integrity monitoring to detect unauthorized changes to web server components. 3) Harden IIS configurations by disabling unnecessary modules and enforcing strict access controls on web server file systems and configuration files. 4) Monitor web traffic for anomalies such as unexpected redirects or content injections, using web application firewalls (WAFs) with updated signatures to detect SEO poisoning patterns. 5) Implement multi-factor authentication and credential hygiene to prevent credential theft and lateral movement as indicated by T1078. 6) Regularly update and patch IIS servers and associated web applications to close vulnerabilities exploited for initial access (T1190). 7) Use threat intelligence feeds to monitor for indicators of compromise related to BadIIS and associated threat actor groups. 8) Train security teams to recognize SEO poisoning tactics and conduct incident response drills focused on web server compromises. 9) Restrict administrative access to IIS servers and monitor logs for suspicious activity related to module installation or configuration changes.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://unit42.paloaltonetworks.com/operation-rewrite-seo-poisoning-campaign/?pdf=print&lg=en&_wpnonce=8cd08de11a"]
Adversary
CL-UNK-1037
Pulse Id
68d2615ca893a861b85e0392
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash71671fa8ac26d056939f44ed4737663e
hash798db0dda596904adf3a34d1e6c322b441f324cc
hash01a616e25f1ac661a7a9c244fd31736188ceb5fce8c1a5738e807fdbef70fd60
hash1c870ee30042b1f6387cda8527c2a9cf6791195e63c5126d786f807239bd0ddc
hash22a4f8aead6aef38b0dc26461813499c19c6d9165d375f85fb872cd7d9eba5f9
hash22a9e1675bd8b8d64516bd4be1f07754c8f4ad6c59a965d0e009cbeaca6147a7
hash23aa7c29d1370d31f2631abd7df4c260b85227a433ab3c7d77e8f2d87589948f
hash271c1ddfdfb6ba82c133d1e0aac3981b2c399f16578fcf706f5e332703864656
hash2af61e5acc4ca390d3bd43bc649ab30951ed7b4e36d58a05f5003d92fde5e9a7
hash36bf18c3edd773072d412f4681fb25b1512d0d8a00aac36514cd6c48d80be71b
hash40a0d0ee76b72202b63301a64c948acb3a4da8bac4671c7b7014a6f1e7841bd2
hash5aa684e90dd0b85f41383efe89dddb2d43ecbdaf9c1d52c40a2fdf037fb40138
hash6cff06789bf27407aa420e73123d4892a8f15cae9885ff88749fd21aa6d0e8ad
hash6d044b27cd3418bf949b3db131286c8f877a56d08c3bbb0924baf862a6d13b27
hash6d79b32927bac8020d25aa326ddf44e7d78600714beacd473238cc0d9b5d1ccf
hash78ef67ec600045b7deb8b8ac747845119262bea1d51b2332469b1f769fb0b67d
hash8078fa156f5ab8be073ad3f616a2302f719713aac0f62599916c5084dd326060
hash82096c2716a4de687b3a09b638e39cc7c12959bf380610d5f8f9ac9cddab64d7
hasha393b62df62f10c5c16dd98248ee14ca92982e7ac54cb3e1c83124c3623c8c43
hasha73c7f833a83025936c52a8f217c9793072d91346bb321552f3214efdeef59eb
hashab0b548931e3e07d466ae8598ca9cd8b10409ab23d471a7124e2e67706a314e8
hashb056197f093cd036fa509609d80ece307864806f52ab962901939b45718c18a8
hashb95a1619d1ca37d652599b0b0a6188174c71147e9dc7fb4253959bd64c4c1e9f
hashbc3bba91572379e81919b9e4d2cbe3b0aa658a97af116e2385b99b610c22c08c
hashc5455c43f6a295392cf7db66c68f8c725029f88e089ed01e3de858a114f0764f
hashc6622e2900b8112e8157f923e9fcbd48889717adfe1104e07eb253f2e90d2c6a
hashd6a0763f6ef19def8a248c875fd4a5ea914737e3914641ef343fe1e51b04f858
hashd8a7320e2056daf3ef4d479ff1bb5ce4facda67dfc705e8729aeca78d6f9ca84
hashde570369194da3808ab3c3de8fb7ba2aac1cc67680ebdc75348b309e9a290d37
hashe2e00fd57d177e4c90c1e6a973cae488782f73378224f54cf1284d69a88b6805
hashed68c5a8c937cd55406c152ae4a2780bf39647f8724029f04e1dce136eb358ea

Ip

ValueDescriptionCopy
ip103.6.235.26
ip103.6.235.78
ip160.30.173.87

Domain

ValueDescriptionCopy
domain008php.com
domainfb88s.icu
domain404.008php.com
domain404.300bt.com
domain404.hao563.com
domain404.hzyzn.com
domain404.pyhycy.com
domain404.yyphw.com
domaincs.pyhycy.com
domainfcp.yyphw.com
domainqp.008php.com
domainsl.008php.com
domainvn404.008php.com
domainwww.massnetworks.org
domainwww.victim.com
domainx404.008php.com

Threat ID: 68d31564c30b0a5e712e6a58

Added to database: 9/23/2025, 9:47:16 PM

Last enriched: 9/23/2025, 9:47:37 PM

Last updated: 9/24/2025, 2:45:47 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats