Cisco Talos Tracks BadIIS 'demo.pdb' Variant as Commodity MaaS Tool Used by Chinese-Speaking Cybercrime Groups
Cisco Talos has uncovered a BadIIS variant identified by 'demo.pdb' strings that is sold as a malware-as-a-service tool among multiple Chinese-speaking cybercrime groups for SEO fraud and traffic manipulation.

Cisco Talos has published a detailed analysis of a BadIIS variant characterized by embedded 'demo.pdb' strings, revealing it as a commodity malware tool sold or shared among multiple Chinese-speaking cybercrime groups under a malware-as-a-service (MaaS) model. The investigation, based on program database (PDB) file paths, traces the malware's development to an author using the alias 'lwxat', with activity spanning from at least September 2021 through January 2026. The consistent PDB path pattern, including Chinese-language folder names and date-based versioning, provides a reliable fingerprint for tracking this toolset across campaigns.
The malware enables a range of malicious activities focused on search engine optimization (SEO) fraud, content injection, and proxy-based traffic manipulation. Talos recovered a dedicated builder tool that allows threat actors to generate configuration files, customize payloads, and inject parameters into BadIIS binaries. Capabilities include traffic redirection to illicit sites, reverse proxying for search engine crawler manipulation, content hijacking, and backlink injection for SEO fraud. The same author has also developed auxiliary tools such as service-based installers, droppers, and persistence mechanisms that automate deployment and evade detection through custom Base64 encoding and obfuscation.
Since 2024, Talos has investigated numerous attacks across the Asia-Pacific region, with a few incidents in South Africa, Europe, and North America, all utilizing this specific BadIIS variant. While multiple security vendors are tracking the global spread of these variants, Talos observed notable divergences in tactics, techniques, and procedures (TTPs) from those documented by Trend Micro, Ahnlab, VNPT, and Elastic. This makes attribution to a single threat actor difficult, but Talos assesses with moderate confidence that the 'demo.pdb' BadIIS variant is a commodity tool used by multiple Chinese-speaking cybercrime groups.
The PDB paths revealed customized builds tailored for specific evasion and targeting purposes. One build explicitly bypasses Norton antivirus, while another performs site-wide hijacking and redirects users conditionally based on browser language or environment. The folder naming conventions indicate rapid iterative updates, with directories such as 'dll0217', 'dll0301', and 'dll0315' suggesting sprint-like development cycles. A particularly notable directory, 'dll-no503', likely represents a troubleshooting build designed to resolve an issue where the malware caused IIS to throw '503 Service Unavailable' errors, which would otherwise alert server administrators to the infection.
The timeline of development shows the earliest PDB timestamp from September 30, 2021, and the latest observed compilation date of January 6, 2026, confirming active maintenance and deployment. Talos also identified a folder named 'Compatible with Baidu browser + hijacking robots.txt', explicitly confirming the malware's role in malicious SEO campaigns targeting the Chinese search engine ecosystem. Another branch, '2024-05-05-tcp', indicates a shift in network traffic handling, potentially introducing custom proxying or SEO fraud communication methods.
Beyond BadIIS, the same author has developed a suite of auxiliary tools, including service-based installers, droppers, and persistence mechanisms that automate deployment, ensure survivability across IIS server restarts, and evade detection through custom Base64 encoding and obfuscation techniques. The PDB artifacts also revealed a possible customer alias 'xshen', further indicating the commercial nature of the toolset. Talos emphasizes that the consistent PDB path pattern offers more intelligence value than the generic 'demo.pdb' filename, enabling reliable clustering and tracking of this BadIIS version toolset.
This discovery highlights the growing commoditization of cybercrime tools, where sophisticated malware is developed and sold as a service to multiple groups, enabling even less technically skilled actors to conduct complex attacks. The focus on IIS servers, which are widely used in enterprise environments, underscores the persistent threat to web infrastructure. Organizations are advised to monitor for indicators of compromise related to BadIIS, including unusual IIS module loads, unexpected traffic redirections, and the presence of 'demo.pdb' strings in memory or logs.