Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site.... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

News Flash

DragonRank and BadIIS malware: the dark side of SEO fraud and gambling redirects

A disturbing search engine manipulation campaign is exploiting IIS servers for illicit purposes

A new cyber attack threatens

Table of contents

  • A new cyber threat targeting IIS servers 
  • Attack targets: governments, universities, and tech companies 
  • DragonRank’s role in spreading BadIIS 
  • The infrastructure behind the attack: Funnull and Triad Nexus 
  • Conclusion: a growing cyber security crisis 

A new cyber threat targeting IIS servers 

A group of cybercriminals has been targeting Internet Information Services (IIS) servers across Asia, exploiting them in a massive search engine optimization (SEO) fraud campaign. The malware in question, known as BadIIS, allows attackers to redirect user traffic to illegal gambling websites, generating illicit profits. 

According to a report by Trend Micro security researchers, the campaign is financially motivated, leveraging organic search traffic to funnel users into fraudulent platforms. 

Attack targets: governments, universities, and tech companies 

The compromised IIS servers are primarily located in India, Thailand, Vietnam, the Philippines, Singapore, Taiwan, South Korea, Japan, and Brazil. Affected entities include government institutions, universities, technology companies, and telecom providers, making this attack particularly concerning for critical infrastructure security. 

Once compromised, the servers modify HTTP responses, redirecting users to fraudulent sites, credential harvesting pages, or attacker-controlled servers. This allows the hackers to manipulate web traffic for illicit purposes. 

DragonRank’s role in spreading BadIIS 

Security analyses attribute this campaign to the DragonRank group, a Chinese cybercriminal entity identified by Cisco Talos in 2024.

This group employs sophisticated methods to inject malicious code into IIS servers, enabling SEO fraud and gambling site redirections. 

The BadIIS malware can analyze incoming HTTP requests, checking details like User-Agent and Referer. If it detects specific search engine-related terms, it redirects users to fraudulent sites instead of their intended destinations. 

The infrastructure behind the attack: Funnull and Triad Nexus 

DragonRank’s campaign is also linked to a broader cybercriminal network operated via the Funnull CDN, a content delivery network (CDN) based in China. 

According to Silent Push, Funnull rents IP addresses from legitimate providers like Amazon Web Services (AWS) and Microsoft Azure to host malicious websites. This method, known as infrastructure laundering, helps hackers evade detection. 

Data reveals that Funnull has leased over 1,200 IP addresses from Amazon and nearly 200 from Microsoft, using them for phishing schemes, romance scams, and money laundering through fake gambling sites.

While many of these IPs have been taken down, new ones are continuously acquired, making mitigation efforts highly challenging. 

Conclusion: a growing cyber security crisis 

The DragonRank campaign highlights the rising threat posed by compromised IIS servers. Using the BadIIS malware for SEO fraud and user redirection showcases how cybercriminals are increasingly adept at manipulating web traffic for illicit gains. 

Organizations must strengthen their defenses by implementing advanced monitoring systems, regularly updating their servers, and adopting robust cyber security strategies to counter these threats. 

To top