GhostRedirector Compromises 65 Windows Servers Through Rungan Backdoor and Gamshen IIS Module

Sep 04, 2025
Data Breach / Malware

Cybersecurity experts have uncovered a new threat cluster known as GhostRedirector, which has infiltrated at least 65 Windows servers predominantly located in Brazil, Thailand, and Vietnam. According to Slovak cybersecurity firm ESET, the attacks have resulted in the installation of a passive C++ backdoor named Rungan, alongside a native Internet Information Services (IIS) module referred to as Gamshen. The threat actor is thought to have been active since at least August 2024.

“While Rungan can execute commands on an infected server, Gamshen is designed to facilitate SEO fraud as-a-service, manipulating search engine results to enhance the page ranking of a specified target website,” stated ESET researcher Fernando Tavella in a report shared with The Hacker News. “Notably, Gamshen only alters responses when requests come from Googlebot, ensuring that regular visitors are not impacted.”

GhostRedirector Compromises 65 Windows Servers Through Rungan Backdoor and Gamshen IIS Module

In a recent cybersecurity investigation, researchers from the Slovak firm ESET have uncovered a sophisticated threat cluster known as GhostRedirector, responsible for breaching at least 65 Windows servers, predominantly situated in Brazil, Thailand, and Vietnam. According to ESET, the malicious activity associated with this group has been leading to the installation of a stealthy C++ backdoor named Rungan alongside a specialized Internet Information Services (IIS) module tagged as Gamshen. The origins of the attack trace back to at least August 2024.

The Rungan backdoor serves as a conduit for executing commands on affected servers, while the Gamshen module is engineered for a specific nefarious objective: to provide SEO fraud services. This functionality allows threat actors to manipulate search engine outcomes, artificially inflating the rankings of designated websites, thereby enhancing their visibility on platforms like Google. ESET researcher Fernando Tavella highlighted that Gamshen’s operations are particularly insidious because it modifies server responses exclusively when requests originate from Googlebot, notably leaving standard users unaffected by its decided malfeasance.

The targeting of Windows servers, a staple for many organizations, presents a significant security concern. With a substantial presence in key regions such as Brazil, Thailand, and Vietnam, those regions have become significant vectors for this ongoing campaign. By exploiting the vulnerabilities inherent in these servers, the attackers establish a foothold that allows for sustained interaction and further exploitation.

To strategically analyze the potential tactics employed by GhostRedirector, we can reference the MITRE ATT&CK matrix, which offers a comprehensive framework for understanding adversary behaviors in cyber incidents. Initial access may have been achieved through techniques such as phishing or exploiting software vulnerabilities, which are prevalent in server environments. Once inside, maintaining persistence would likely entail leveraging the Rungan backdoor, enabling the actors to maneuver undetected.

Privilege escalation techniques might have also been crucial, allowing the attackers to gain elevated permissions that facilitate broader control over the compromised systems. Ultimately, the manipulation of search engine results through Gamshen underscores not only the breadth of the attack but also the increasing sophistication of cybercriminals, who now offer services that were once the domain of traditional black-hat hacking.

As businesses continue to navigate an ever-evolving cybersecurity landscape, the emergence of GhostRedirector serves as a stark reminder of the complexity and peril associated with cyber threats. Organizations should remain vigilant, ensuring that their IT infrastructures adhere to the latest security protocols to guard against similar attacks that exploit known vulnerabilities and employ advanced tactics to compromise systems. Adopting a proactive stance is critical for safeguarding sensitive data and maintaining operational integrity in the face of these evolving threats.

Source link