Chinese Hacker Group Compromises ~2,000 Windows Servers

A Chinese-speaking threat group known as REF4033 (UAT-8099) has apparently compromised more than 1,800 Windows IIS servers worldwide, deploying a malicious module called BADIIS to conduct a large-scale SEO poisoning campaign. The attackers inject malicious IIS modules that manipulate search engine rankings and redirect legitimate web traffic to online gambling, pornography, and fraudulent cryptocurrency sites. By leveraging trusted infrastructure — including government, healthcare, education, and financial systems — the group amplifies credibility while monetizing hijacked traffic at scale.

The intrusion relies on deploying a malicious executable (CbsMsgApi.exe) that creates persistence via a rogue Windows service and loads a DLL into the IIS request pipeline. Once embedded, BADIIS filters traffic by User-Agent, geography, and referrer headers, dynamically redirecting users to region-specific scam platforms while feeding search engines optimized keyword-stuffed content. Nearly 30% of compromised servers are hosted on major cloud platforms like AWS and Azure, underscoring how attackers exploit misconfigurations and weak monitoring across hybrid environments.

Stopping campaigns like this requires unified visibility across endpoint, server, web application, and network layers. Organizations must correlate process execution, IIS configuration changes, file integrity monitoring, web logs, network flows, and cloud telemetry within a single security platform like NIKSUN. By combining endpoint detection with web traffic analytics and automated response, defenders can detect unauthorized service creation, block malicious module injection, and isolate infected servers before traffic redirection spreads. In modern web attacks, deep server visibility plus network intelligence — not siloed tools — is essential to prevent infrastructure hijacking at scale. Read more about this story on our LinkedIn page

We use cookies to offer you a better browsing experience and to analyze site traffic. By using our site, you consent to our use of cookies.

Essential Cookies
Site Analytics