UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS

By Published On: February 2, 2026

Unmasking UAT-8099: A Deep Dive into IIS Server Attacks

In the dynamic landscape of cyber threats, a new and concerning campaign, dubbed UAT-8099, has set its sights on vulnerable Internet Information Services (IIS) servers. This sophisticated operation, active from late 2025 through early 2026, exhibits a strategic shift towards region-specific targeting, particularly impacting organizations in Thailand and Vietnam. Threat actors are deploying an array of malicious tools, including web shells, PowerShell scripts, and a customized variant of the BadIIS malware, to compromise unpatched systems and establish persistent access.

The Modus Operandi: Exploiting IIS Vulnerabilities

UAT-8099 leverages unpatched vulnerabilities within IIS servers as its primary entry vector. While the specific CVEs exploited aren’t detailed in the provided source, it’s crucial to understand that attackers consistently target known weaknesses that haven’t been remediated. Once a vulnerability is successfully exploited, the attackers move swiftly to deploy their arsenal of tools.

Web Shell Deployment: The Initial Foothold

A key component of the UAT-8099 attack chain is the deployment of web shells. These malicious scripts, often disguised as legitimate files, grant attackers remote administrative access to the compromised server through a web browser. Web shells allow for file manipulation, command execution, and network reconnaissance, effectively providing a persistent backdoor for further malicious activities.

Leveraging PowerShell for Post-Exploitation

Following the establishment of a web shell, UAT-8099 actors extensively utilize PowerShell for post-exploitation activities. PowerShell, a powerful scripting language built into Windows, is a favored tool for attackers due to its legitimate system access and ability to bypass traditional security controls. Through PowerShell, attackers can:

  • Execute arbitrary commands.
  • Download and execute additional malware.
  • Steal credentials.
  • Escalate privileges.
  • Move laterally within the network.

The Threat of Region-Customized BadIIS

A particularly concerning aspect of this campaign is the deployment of a region-customized BadIIS malware. While the specifics of “BadIIS” aren’t fully detailed, the customization suggests that the malware is tailored to specific regional environments or target types, potentially incorporating language-specific elements or leveraging local infrastructure for command and control. This level of customization indicates a highly organized and resourced threat actor group.

Geographic Focus: Thailand and Vietnam

The explicit targeting of organizations in Thailand and Vietnam highlights a concerning trend of geographically focused cyber campaigns. This regional specificity could be driven by a variety of factors, including geopolitical interests, industry-specific targeting within those regions, or perceived weaknesses in their cybersecurity defenses. Organizations operating in these areas must enhance their vigilance and defensive postures.

Remediation Actions

Protecting against sophisticated campaigns like UAT-8099 requires a proactive and multi-layered approach. Organizations must prioritize the security of their IIS infrastructure.

  • Patch Management: Regularly apply security patches and updates for your IIS servers and underlying operating systems. This is the single most critical step in preventing exploitation of known vulnerabilities.
  • Web Application Firewall (WAF): Implement and properly configure a WAF to detect and block web-based attacks, including web shell uploads and common exploitation attempts.
  • Endpoint Detection and Response (EDR): Deploy EDR solutions to monitor for suspicious activity, including PowerShell execution and unusual file modifications, on your IIS servers.
  • Principle of Least Privilege: Ensure that IIS application pools and services run with the minimum necessary privileges.
  • Network Segmentation: Isolate IIS servers from other critical network segments to limit the impact of a potential breach.
  • Regular Backups: Maintain regular, tested backups of all critical data and configurations to ensure swift recovery in case of an attack.
  • Security Audits and Penetration Testing: Conduct frequent security audits and penetration tests to identify and remediate vulnerabilities before attackers can exploit them.
  • Threat Intelligence: Stay informed about the latest threat intelligence, particularly regarding campaigns targeting your region or industry.

Recommended Security Tools

Tool Name Purpose Link
Microsoft Baseline Security Analyzer (MBSA) Scans for common security misconfigurations and missing patches on Microsoft products, including IIS. Discontinued by Microsoft; consider Azure Security Center or local security policies.
OWASP ZAP A free, open-source web application security scanner for finding vulnerabilities in web applications. https://www.zaproxy.org/
Nessus A comprehensive vulnerability scanner that identifies security vulnerabilities and misconfigurations in various systems, including IIS. https://www.tenable.com/products/nessus
Snort An open-source intrusion detection/prevention system that can alert on suspicious network traffic and known attack patterns. https://www.snort.org/

Conclusion

The UAT-8099 campaign underscores the persistent and evolving threat landscape facing organizations with IIS servers. The combination of web shells, PowerShell misuse, and region-customized malware demonstrates a sophisticated adversary. Organizations, especially those in targeted regions like Thailand and Vietnam, must prioritize robust patch management, implement strong defensive measures, and maintain continuous vigilance to safeguard their critical infrastructure from such targeted and advanced threats. Proactive security practices are not merely best practice; they are a fundamental necessity.

 

Share this article

Leave A Comment