A newly identified, China-aligned threat actor has compromised at least 65 Windows servers globally, deploying custom tools for both remote access and a novel SEO fraud-as-a-service scheme. * The actor uses a passive C++ backdoor for command execution and a malicious native IIS module to manipulate Google search rankings for third-party gambling websites. * Initial access likely leverages SQL injection, followed by privilege escalation via custom tools based on public exploits and deployment of webshells. * Operational resilience is maintained through multiple backdoors, rogue administrator accounts, and legitimate remote access software, ensuring persistent access and diverse attack capabilities.