ESET Research has uncovered a previously undocumented threat actor it calls GhostRedirector, which in June 2025 was found to have compromised at least 65 Windows servers across multiple countries and deployed two custom tools — a C++ backdoor named Rungan and a native IIS module named Gamshen used to perform targeted SEO fraud that serves altered content only to search‑engine crawlers.
ESET’s public disclosure and press bulletin describe a campaign observed in telemetry between December 2024 and April 2025, with a follow‑up internet‑wide scan in June 2025 that identified additional victims. The affected servers are geographically dispersed, with concentrations in Brazil, Thailand, Vietnam, and the United States, and additional compromises reported in Canada, Finland, India, the Netherlands, the Philippines, and Singapore. ESET reports that victims span a wide range of sectors — education, healthcare, insurance, transportation, technology, and retail — indicating the actor’s opportunistic targeting of internet‑facing IIS hosts rather than a single vertical. ESET attributes the activity as “very likely China‑aligned” while noting that the assessment is based on tooling, infrastructure and telemetry patterns rather than an ironclad confession; attribution remains an analyst judgment and is framed as such in ESET’s writeup. The discovery is notable for combining a server‑side SEO fraud capability (an IIS native module that selectively serves crafted responses to Googlebot) with a separate remote‑access implant for broader remote control and file/registry/service manipulation.
[*]HTTP responses differing by User‑Agent (Googlebot, Bingbot) or by crawler IPs
[*]Compare responses captured for ordinary browsers vs. known crawler IP ranges and user agent strings.
[*]Look for injected backlinks, redirects, or HTML snippets served only to crawler requests. (globenewswire.com)
[*]Unexpected service and registry changes
[*]Track ServiceDLL modifications, newly created services, and recent registry changes tied to persistence.
[*]Anomalous service creation coupled with w3wp.exe activity is a red flag. [*]Named pipe creation patterns and Sysmon event telemetry that match Potato usage
[*]Enable Sysmon logging for named pipes and monitor for patterns used by EfsPotato/other Potato tools; various Sigma rules and vendor guidance can be used to alert on these behaviors. (github.com)
[*]Newly created local/administrator accounts and scheduled tasks
[*]Rogue user provisioning and scheduled tasks (especially those that run elevated binaries) are common persistence techniques used in the campaign. [*]Web shell artifacts and memory analysis for .NET modules
[*]If a host is suspected, automated scanning plus memory dumps for w3wp.exe can surface in‑memory implants and web shell strings. Industry writeups show how attackers often leave cryptic .ASPX/ASPXX web shells behind; a memory scan can reveal modules that file scans miss. (welivesecurity.com)
[/LIST]
Source: GlobeNewswire ESET Research discovers new Chinese threat group: GhostRedirector manipulates Google, poisons Windows servers with backdoors
Background / Overview
ESET’s public disclosure and press bulletin describe a campaign observed in telemetry between December 2024 and April 2025, with a follow‑up internet‑wide scan in June 2025 that identified additional victims. The affected servers are geographically dispersed, with concentrations in Brazil, Thailand, Vietnam, and the United States, and additional compromises reported in Canada, Finland, India, the Netherlands, the Philippines, and Singapore. ESET reports that victims span a wide range of sectors — education, healthcare, insurance, transportation, technology, and retail — indicating the actor’s opportunistic targeting of internet‑facing IIS hosts rather than a single vertical. ESET attributes the activity as “very likely China‑aligned” while noting that the assessment is based on tooling, infrastructure and telemetry patterns rather than an ironclad confession; attribution remains an analyst judgment and is framed as such in ESET’s writeup. The discovery is notable for combining a server‑side SEO fraud capability (an IIS native module that selectively serves crafted responses to Googlebot) with a separate remote‑access implant for broader remote control and file/registry/service manipulation. Why this matters: SEO fraud meets backdoor persistence
Most web server compromises are leveraged for data theft, hosting phishing pages, command‑and‑control staging, or cryptomining. What makes GhostRedirector unusual is the pairing of a standard administrative backdoor with a purpose‑built IIS module that performs SEO manipulation — essentially turning compromised corporate websites into invisible doorway pages that improve search ranking for third‑party targets (in this case, gambling sites) only when crawlers visit. That preserves the site’s outward appearance for normal users while silently gaming search algorithms, and it can taint the reputation of the compromised domain. (globenewswire.com, globenewswire.com, github.com, globenewswire.com, globenewswire.com, unit42.paloaltonetworks.com, globenewswire.com)[*]HTTP responses differing by User‑Agent (Googlebot, Bingbot) or by crawler IPs
[*]Compare responses captured for ordinary browsers vs. known crawler IP ranges and user agent strings.
[*]Look for injected backlinks, redirects, or HTML snippets served only to crawler requests. (globenewswire.com)
[*]Unexpected service and registry changes
[*]Track ServiceDLL modifications, newly created services, and recent registry changes tied to persistence.
[*]Anomalous service creation coupled with w3wp.exe activity is a red flag. [*]Named pipe creation patterns and Sysmon event telemetry that match Potato usage
[*]Enable Sysmon logging for named pipes and monitor for patterns used by EfsPotato/other Potato tools; various Sigma rules and vendor guidance can be used to alert on these behaviors. (github.com)
[*]Newly created local/administrator accounts and scheduled tasks
[*]Rogue user provisioning and scheduled tasks (especially those that run elevated binaries) are common persistence techniques used in the campaign. [*]Web shell artifacts and memory analysis for .NET modules
[*]If a host is suspected, automated scanning plus memory dumps for w3wp.exe can surface in‑memory implants and web shell strings. Industry writeups show how attackers often leave cryptic .ASPX/ASPXX web shells behind; a memory scan can reveal modules that file scans miss. (welivesecurity.com)
[/LIST]
Practical mitigations and response checklist
- Immediate containment
- Take affected IIS hosts offline in a controlled manner (or isolate them) to prevent additional abuse of hosted sites.
- Preserve volatile memory and image the server for forensic analysis before rebooting or making changes.
- Short‑term remediation
- Search for and remove unauthorized IIS modules and any newly installed services or scheduled tasks; disable unknown accounts.
- Replace credentials for any potentially compromised accounts, and revoke or rotate any certificates or API keys exposed in logs.
- Hardening and prevention
- Patch web applications and servers to fix injection vulnerabilities and other internet‑facing bugs that enabled initial access; ESET points to likely SQL injection vectors in this campaign, so code and WAF reviews are essential.
- Restrict the ability to register IIS native modules to a small set of administrators and protect those accounts with MFA and just‑in‑time access.
- Deploy a Web Application Firewall (WAF) tuned to block SQL injection and malicious payloads; log both blocked and allowed requests for hunting.
- Detection controls
- Enable Sysmon with named pipe and command‑line logging; implement detection rules to catch Potato family behaviors and suspicious w3wp.exe module loads. (github.com)
- Monitor for content differences to known crawler user agents and unusual redirects to unknown gambling domains.
- Long‑term resilience
- Maintain offline backups and implement immutable snapshots to accelerate recovery.
- Conduct red‑team exercises against IIS hosts to test for module‑injection and privilege escalation paths that mimic Potato techniques.
- External coordination
- Notify affected customers or users as required by law and coordinate with your hosting provider if the server is co‑located or colocation space is shared.
- If compromise involves regulated data, consult legal/compliance teams for breach notification obligations.
Broader context: native IIS modules and the Potato family are persistent trends
- Native IIS modules offer attackers a stealthy, powerful platform for a range of abuse cases: data theft, cloaked content for crawlers, web shells, and covert C2 channels. Prior ESET research into IISerpent and IISpy shows the same design pattern: an IIS server extension that intercepts requests and alters responses for selective targets. GhostRedirector fits this lineage.
- The Potato suite of privilege escalation tools remains a common plane‑of‑movement for post‑exploit escalation on Windows IIS/MS‑SQL hosts. Detection is nontrivial because many variants are simple native binaries that exploit design quirks in Windows token management; defenders must rely on behavioral telemetry (named pipe usage, strange token impersonation patterns) rather than file signatures alone. (manageengine.com)
- Industry telemetry shows repeated targeting of Southeast Asia and Latin America by China‑aligned and other nation‑aligned groups, particularly where exposed servers or hosting relationships provide low‑cost staging. The GhostRedirector campaign’s victim mix aligns with that pattern, reinforcing a trend of opportunistic attacks that weaponize commodity techniques for profit (such as SEO fraud) and espionage (backdoors). (thehackernews.com)
Limitations, open questions, and cautionary notes
- Attribution caveat: ESET’s assessment that GhostRedirector is “very likely China‑aligned” is an analytic judgment; attribution in cybersecurity is inherently probabilistic and depends on multiple converging signals. Treat the attribution as an informed hypothesis rather than a closed conclusion.
- Visibility gap: ESET found at least 65 compromised servers via scanning and telemetry; the real number may be higher because many servers and hosts are not instrumented with enterprise‑grade monitoring or may not be visible to ESET’s sensors. Expect potential undiscovered victims.
- Evolving tooling: The presence of custom native code (Rungan, Gamshen) means that static signature coverage will lag. Behavioral detections and configuration hygiene are more dependable than signatures alone.
Conclusion
GhostRedirector represents a pragmatic, resilient threat that blends two profitable objectives: covert search‑engine manipulation via a stealthy IIS extension, and traditional post‑exploit persistence and control via a native backdoor and a suite of privilege escalation and fallback tools. The campaign underscores several enduring lessons for Windows/IIS administrators and security teams:- Harden and monitor internet‑facing IIS and database services; assume the worst when code injection or SQL injection is possible.
- Log and inspect crawler‑specific behavior and keep an eye on content served to crawlers versus real users.
- Use behavior‑based telemetry (Sysmon, EDR, web logs) to detect Potato‑style privilege escalation and native module registration.
- Treat attribution as informative but not definitive; focus remediation on resilient cleanup and closing initial access vectors.
Source: GlobeNewswire ESET Research discovers new Chinese threat group: GhostRedirector manipulates Google, poisons Windows servers with backdoors


