ESET researchers have uncovered a compact but sophisticated campaign — tracked as GhostRedirector — that has secretly turned at least 65 Internet‑facing Windows servers into a stealthy SEO‑fraud network while simultaneously installing a resilient native backdoor for long‑term access...
A compact but sophisticated campaign tracked as GhostRedirector has infected at least 65 Internet‑facing Windows IIS servers and paired a stealthy native backdoor with an in‑process IIS module to run a covert, profitable SEO fraud operation that pushes third‑party gambling sites while leaving...
ESET’s researchers have uncovered a previously undocumented threat cluster that covertly poisons legitimate IIS-hosted websites to manipulate Google rankings while also planting a stealthy C++ backdoor on Windows servers — a campaign ESET calls GhostRedirector that, according to an internet-wide...
ESET researchers have uncovered a compact but sophisticated campaign — tracked as GhostRedirector — that has compromised at least 65 Internet‑facing Windows servers and combined a native C++ backdoor with a malicious IIS native module to deliver long‑lived persistence and server‑side SEO fraud...
ESET Research has uncovered a previously undocumented threat actor it calls GhostRedirector, which in June 2025 was found to have compromised at least 65 Windows servers across multiple countries and deployed two custom tools — a C++ backdoor named Rungan and a native IIS module named Gamshen...
Original release date: September 22, 2020
Summary
This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise frameworks for all referenced threat actor techniques.
This product was written by the Cybersecurity and...
Original release date: July 27, 2020
Summary
This is a joint alert from the United States Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC).
CISA and NCSC are investigating a strain of malware known as QSnatch, which...
Original release date: January 31, 2020
Summary
Unknown cyber network exploitation (CNE) actors have successfully compromised numerous organizations that employed vulnerable Citrix devices through a critical vulnerability known as CVE-2019-19781.Link Removed
Though mitigations were released...
Ok, so i have been hacked. Even with rsa key, this person still gets in into my ssh server. I watched bitvise popup and say "accepting connection from china on ip 111.x.x.x"
So somehow they are getting in and i do not know how. As of now, the server is turned off.
here is a pic. So how do i...
Original release date: December 19, 2014
Systems Affected
Microsoft Windows
Overview
US-CERT was recently notified by a trusted third party of cyber threat actors using a Server Message Block (SMB) Worm Tool to conduct cyber exploitation activities recently targeting a major entertainment...
Hello,
Sorry if i posted it in wrong place.
I have program that tells me that i have lots of bad trojans such as Trojan.win32/agent trojan-spy etc. Program is called Advanced system care 6 pro. I installed it today and when I ran scan it said scanning trojan.win32/agent trojan.win32/vunto...
I've heard and seen mixed reviews about this same question - some about where its specifically located to differentiate whether its the backdoor trojan or it being the real program
I've scanned my system with MalwareBytes and Norton 360
Heres a few lists pertaining to my system:
Tasklist...
I use Windows 7 Home Premium, 32-bit OS on a Lenovo G530 (so I'm having enough issues with my screen brightness, too).
About a week ago my computer's anti-virus security program, Avast, started detecting possible infections but when I went to take care of them, the program wouldn't do...
A new piece of malware is capable of killing the Windows boot process, according to Microsoft. Win32/Yonsole.A is a backdoor Trojan, a term that defines a piece of malicious code designed to compromise computers and subsequently connect to a server controlled by the attacker, receive and execute...
antivirus
backdoor
boot process
compromise
computer security
cybersecurity
infection
malicious code
malware
master boot record
mbr
microsoft
pc issues
protection
remote server
trojan
user control
virus
windows
yonsole
A spyware application that surreptitiously scans chat logs and hard drives of unsuspecting Mac users has found its way onto three of the more popular download sites, security researchers said Tuesday.
Dubbed OSX/OpinionSpy, the spyware is distributed through software available on sites...
application
backdoor
browser
chat logs
data theft
download sites
encryption
hard drive
intego
mac
malware
osx
privacy
screensaver
security
spyware
surveillance
user data
white-hat hacker
windows
March 7, 2010
USB Battery Recharger Status Software contains Trojan, says US-CERT ( United States Emergency Readiness Team)
Back door Malware software that accompanies the Energizer DUO USB Battery Charger contains Trojan Horse that gives hackers total access to a Windows PC.
The Energizer...