Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Top 8 Practices Every CISO Must Follow for Effective Risk Reviews

April 29, 2026

UAT-8099 DNS Vulnerabilities Exploitable by Threat Actors

April 29, 2026

VECT 2.0 Ransomware Blasts Files Over 128 KB on Windows, Linux, and ESXi

April 29, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » UAT-8099 DNS Vulnerabilities Exploitable by Threat Actors
Most Read

UAT-8099 DNS Vulnerabilities Exploitable by Threat Actors

Staff WriterBy Staff WriterApril 29, 2026No Comments2 Mins Read2 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Top Highlights

  1. The UAT-8099 campaign exploits vulnerable IIS servers in Asia, deploying web shells and PowerShell scripts to gain remote access and deploy malicious tools like GotoHTTP and BadIIS variants.
  2. Attackers register suspicious, newly created or spoofed domains (e.g., mimicking Google), often with random characters, to facilitate phishing, malware distribution, and command-and-control activities.
  3. Numerous involved domains and IP addresses have been identified as already weaponized or connected to prior malicious campaigns, confirming ongoing infrastructure used for cyberattacks and malware dissemination.

Threat, Attack Techniques, and Targets

UAT-8099 is a cyber threat actor active since late 2025, mainly targeting vulnerable IIS servers in Asia, especially Thailand and Vietnam. They use web shells and PowerShell scripts to carry out attacks. These tools help them deploy the GotoHTTP tool, which allows remote access to compromised servers. The attacker also employs new BadIIS variants. These variants are specifically tailored for each region and come with customized features. They are hardcoded with target region details, making detection harder. Further analysis showed that the attacker communicates with specific domains and IP addresses. Some domain resolutions date back as far as 2017, indicating long-term activity. Most malicious domains are newly registered or mimic legitimate sites like Google. In addition, many IP addresses associated with these domains are categorized as malicious. The attacker also relies on email-connected domains, some of which have been involved in malware distribution campaigns. This shows a focus on exploiting web infrastructure and email accounts for their attacks.

Impact, Security Implications, and Remediation Guidance

The activities of UAT-8099 can cause serious security issues. Compromised IIS servers may serve as entry points for further malware attacks. The use of web shells and PowerShell scripts suggests that attackers can easily take control of affected systems. Long-standing domain resolutions and suspicious domain registrations suggest a persistent threat. Consequently, organizations using IIS servers in the targeted regions should be cautious. They may face data theft, malware spread, or service disruption if infected. To stay protected, it is recommended to consult security vendors or relevant authorities for specific remediation steps. These may include updates, patches, or monitoring practices. Since no detailed remediation guidance is provided here, obtaining advice from cybersecurity experts is crucial for effective response.

Stay Ahead with the Latest Tech Trends

Stay informed on the revolutionary breakthroughs in Quantum Computing research.

Discover archived knowledge and digital history on the Internet Archive.

ThreatIntel-V1

CISO Insights cyber attack cyber risk Cybersecurity malware MX1 phishing risk management Threat Actor Threat Campaign Threat Management
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleVECT 2.0 Ransomware Blasts Files Over 128 KB on Windows, Linux, and ESXi
Next Article Top 8 Practices Every CISO Must Follow for Effective Risk Reviews
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Top 8 Practices Every CISO Must Follow for Effective Risk Reviews

April 29, 2026

VECT 2.0 Ransomware Blasts Files Over 128 KB on Windows, Linux, and ESXi

April 29, 2026

Microsoft Windows Shell Zero-Click Vulnerability Exploited in Attacks

April 29, 2026

Comments are closed.

Latest Posts

VECT 2.0 Ransomware Blasts Files Over 128 KB on Windows, Linux, and ESXi

April 29, 2026

Microsoft Windows Shell Zero-Click Vulnerability Exploited in Attacks

April 29, 2026

Vimeo Data Breach: Hackers Access Users’ Information

April 29, 2026

Minecraft Players Targeted by LofyStealer via Node.js Loader & Browser Injection

April 29, 2026
Don't Miss

Top 8 Practices Every CISO Must Follow for Effective Risk Reviews

By Staff WriterApril 29, 2026

Risk reviews are essential for transforming reactive security data into proactive insights, focusing on key…

VECT 2.0 Ransomware Blasts Files Over 128 KB on Windows, Linux, and ESXi

April 29, 2026

Microsoft Windows Shell Zero-Click Vulnerability Exploited in Attacks

April 29, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Top 8 Practices Every CISO Must Follow for Effective Risk Reviews
  • UAT-8099 DNS Vulnerabilities Exploitable by Threat Actors
  • VECT 2.0 Ransomware Blasts Files Over 128 KB on Windows, Linux, and ESXi
  • Microsoft Windows Shell Zero-Click Vulnerability Exploited in Attacks
  • Vimeo Data Breach: Hackers Access Users’ Information
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Top 8 Practices Every CISO Must Follow for Effective Risk Reviews

April 29, 2026

UAT-8099 DNS Vulnerabilities Exploitable by Threat Actors

April 29, 2026

VECT 2.0 Ransomware Blasts Files Over 128 KB on Windows, Linux, and ESXi

April 29, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202631 Views

The New Face of DDoS is Impacted by AI

August 4, 202526 Views

Unlock the Power of Free WormGPT: Harnessing DeepSeek, Gemini, and Kimi-K2 AI Models

November 27, 202525 Views

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Most Read
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.