Tag ESET

GhostRedirector Compromises 65 Windows Servers Through Rungan Backdoor and Gamshen IIS Module

Sep 04, 2025
Data Breach / Malware

Cybersecurity experts have uncovered a new threat cluster known as GhostRedirector, which has infiltrated at least 65 Windows servers predominantly located in Brazil, Thailand, and Vietnam. According to Slovak cybersecurity firm ESET, the attacks have resulted in the installation of a passive C++ backdoor named Rungan, alongside a native Internet Information Services (IIS) module referred to as Gamshen. The threat actor is thought to have been active since at least August 2024.

“While Rungan can execute commands on an infected server, Gamshen is designed to facilitate SEO fraud as-a-service, manipulating search engine results to enhance the page ranking of a specified target website,” stated ESET researcher Fernando Tavella in a report shared with The Hacker News. “Notably, Gamshen only alters responses when requests come from Googlebot, ensuring that regular visitors are not impacted.”

GhostRedirector Compromises 65 Windows Servers Through Rungan Backdoor and Gamshen IIS Module In a recent cybersecurity investigation, researchers from the Slovak firm ESET have uncovered a sophisticated threat cluster known as GhostRedirector, responsible for breaching at least 65 Windows servers, predominantly situated in Brazil, Thailand, and Vietnam. According to ESET,…

Read More

GhostRedirector Compromises 65 Windows Servers Through Rungan Backdoor and Gamshen IIS Module

Sep 04, 2025
Data Breach / Malware

Cybersecurity experts have uncovered a new threat cluster known as GhostRedirector, which has infiltrated at least 65 Windows servers predominantly located in Brazil, Thailand, and Vietnam. According to Slovak cybersecurity firm ESET, the attacks have resulted in the installation of a passive C++ backdoor named Rungan, alongside a native Internet Information Services (IIS) module referred to as Gamshen. The threat actor is thought to have been active since at least August 2024.

“While Rungan can execute commands on an infected server, Gamshen is designed to facilitate SEO fraud as-a-service, manipulating search engine results to enhance the page ranking of a specified target website,” stated ESET researcher Fernando Tavella in a report shared with The Hacker News. “Notably, Gamshen only alters responses when requests come from Googlebot, ensuring that regular visitors are not impacted.”

ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Vulnerabilities, Docker Breach, and 15 Additional Stories

In an era where technology often blurs the line between benign and harmful use, cybersecurity challenges are evolving rapidly. Recent insights reveal a trend where cyber adversaries engage in more subtle exploitation tactics, seamlessly integrating malicious activities within widely used tools, applications, and AI systems. The once-clear narratives of “hacker”…

Read MoreThreatsDay Bulletin: Stealth Loaders, AI Chatbot Vulnerabilities, Docker Breach, and 15 Additional Stories

New UEFI Firmware Vulnerabilities Discovered in Multiple Lenovo Laptop Models

Lenovo Addresses Critical UEFI Firmware Vulnerabilities Affecting Various Devices Lenovo has identified and addressed three significant vulnerabilities within the Unified Extensible Firmware Interface (UEFI) firmware that impact numerous Yoga, IdeaPad, and ThinkBook devices. These shortcomings could allow an adversary to disable UEFI Secure Boot or reset factory default Secure Boot…

Read MoreNew UEFI Firmware Vulnerabilities Discovered in Multiple Lenovo Laptop Models

New Vulnerability in Acer Laptops May Allow Attackers to Bypass Secure Boot Protection

Acer Addresses Security Vulnerability in Firmware Update Acer has issued a critical firmware update to mitigate a significant security flaw that could potentially disable UEFI Secure Boot on a range of its devices. This vulnerability, classified as CVE-2022-4020, affects several models including the Aspire A315-22, A115-21, A315-22G, as well as…

Read MoreNew Vulnerability in Acer Laptops May Allow Attackers to Bypass Secure Boot Protection

Google Alerts Users to Zero-Day Vulnerability in Internet Explorer Exploited by ScarCruft Hackers

A zero-day vulnerability in Internet Explorer has been exploited by a North Korean threat actor, specifically targeting South Korean users. The attack exploits the heightened public sensitivity surrounding the recent Itaewon Halloween crowd crush incident, leveraging social engineering tactics to entice victims into downloading malware. This discovery was detailed by…

Read MoreGoogle Alerts Users to Zero-Day Vulnerability in Internet Explorer Exploited by ScarCruft Hackers

[Video] Ukrainian Authorities Capture Servers from Software Company Tied to NotPetya Cyberattack

Ukrainian Police Conduct Raids Linked to NotPetya Ransomware Incident The Ukrainian National Police recently enacted a significant operation targeting the company behind the M.E.Doc accounting software, which has been implicated in the widespread NotPetya ransomware outbreak that has affected numerous major corporations worldwide. A video released by the police depicts…

Read More[Video] Ukrainian Authorities Capture Servers from Software Company Tied to NotPetya Cyberattack

Android Malware Exploits Google Gemini During Runtime

Cybercrime, Endpoint Security, Fraud Management & Cybercrime Experts Reveal PromptSpy Leverages AI for Enhanced Device Persistence Pooja Tikekar (@PoojaTikekar) • February 20, 2026 Image: Shutterstock Recent investigations have unearthed a novel strain of Android malware known as PromptSpy, which harnesses Google’s Gemini generative artificial intelligence model to automate its persistence…

Read MoreAndroid Malware Exploits Google Gemini During Runtime

Gazer: A Novel Backdoor Threat Targeting Ministries and Embassies Globally

New Malware Campaign Targets Diplomatic Entities Worldwide Recent findings from cybersecurity firm ESET reveal a sophisticated malware campaign that has been orchestrating attacks on consulates, ministries, and embassies across the globe in a bid to gather intelligence on governmental operations and diplomats. This campaign, which has reportedly been active since…

Read MoreGazer: A Novel Backdoor Threat Targeting Ministries and Embassies Globally