DragonRank Black Hat SEO Campaign Targeting IIS Servers Across Asia and Europe

DragonRank Black Hat SEO Campaign Targeting IIS Servers Across Asia and Europe

September 11, 2024 at 12:00PM

A new campaign known as DragonRank, linked to a Chinese-speaking actor, is orchestrating black hat SEO attacks across Asia and Europe. Exploiting web applications, the group deploys malware to manipulate search engine algorithms, boosting the ranking of targeted websites. The attacks span various industry sectors and deploy methods to drive traffic to malicious sites.

From the meeting notes, it is evident that a sophisticated black hat SEO operation named “DragonRank” has been uncovered. The operation targets multiple countries in Asia and Europe with the goal of manipulating search engine algorithms and SEO rank for various fraudulent purposes. The group employs a range of techniques, including deploying web shells, launching malware such as PlugX and BadIIS, and engaging in credential-harvesting activities.

The attacks have compromised numerous Internet Information Services (IIS) servers, with a specific focus on using the BadIIS malware to facilitate proxy ware and SEO fraud. DragonRank’s unique approach involves utilizing IIS malware to manipulate search engine algorithms and boost the ranking of third-party websites. Additionally, the group manipulates keywords related to porn and sex to drive traffic to malicious sites and increase the visibility of fraudulent content.

DragonRank distinguishes itself from other black hat SEO cybercrime groups by actively breaching additional servers within the target’s network and maintaining control over them using backdoors and credential-harvesting programs. The group also engages in illegal business transactions through Telegram and QQ instant message applications, offering tailored promotional plans to paying clients.

The article provides comprehensive insight into the sophisticated tactics employed by DragonRank and highlights the need for heightened vigilance and security measures to combat such malicious activities. If you have any specific action items or need further analysis on this topic, please let me know.

Full Article