GhostRedirector: 65+ Windows Servers Compromised to Run SEO-Fraud IIS Malware
ESET uncovered a new threat cluster dubbed GhostRedirector that compromised at least 65 Windows servers (mainly in Brazil, Thailand, and Vietnam) to install a passive C++ backdoor (“Rungan”) and a malicious IIS module (“Gamshen”) . The goal wasn’t ransomware—it was SEO fraud as-a-service : the IIS module quietly altered HTTP responses only for Googlebot , creating artificial backlinks to boost third-party (likely gambling) sites. Initial access likely came from SQL injection , followed by PowerShell-delivered tools, local privilege escalation using BadPotato/EfsPotato , and creation of rogue admin users for persistence. ESET assesses medium confidence the actor is China-aligned (hard-coded Chinese strings, China code-signing cert, “huang” password). What happened (Key Points) Scope: ≥65 Windows servers compromised; victims span education, healthcare, insurance, transport, tech, retail ; activity seen since Aug–Dec 2024 and measured in June 2025 scans. Malware duo: Ru...