← Back to BrewedIntel
malwarehighBackdoorSEO PoisoningGhostRedirector

Sep 04, 2025 • ESET WeLiveSecurity

GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes

ESET researchers have uncovered a new campaign dubbed GhostRedirector targeting Windows servers. This threat involves a passive C++ backdoor and a malicious...

Source
ESET WeLiveSecurity
Category
malware
Severity
high

Executive Summary

ESET researchers have uncovered a new campaign dubbed GhostRedirector targeting Windows servers. This threat involves a passive C++ backdoor and a malicious Internet Information Services (IIS) module designed to manipulate Google search results. The primary impact involves server compromise and SEO poisoning, potentially redirecting traffic to malicious sites or compromising server integrity. The attack vector leverages server-side vulnerabilities to establish persistence through IIS modules. Organizations hosting Windows servers should prioritize patching IIS services, monitoring for unauthorized modules, and implementing strict access controls. Security teams are advised to scan for unknown C++ backdoors and review search engine indexing for anomalies. Immediate mitigation includes isolating affected servers and conducting forensic analysis to identify the extent of the backdoor installation. Vigilance against SEO poisoning techniques is crucial for maintaining web infrastructure security.

Summary

ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results

Published Analysis

ESET researchers have uncovered a new campaign dubbed GhostRedirector targeting Windows servers. This threat involves a passive C++ backdoor and a malicious Internet Information Services (IIS) module designed to manipulate Google search results. The primary impact involves server compromise and SEO poisoning, potentially redirecting traffic to malicious sites or compromising server integrity. The attack vector leverages server-side vulnerabilities to establish persistence through IIS modules. Organizations hosting Windows servers should prioritize patching IIS services, monitoring for unauthorized modules, and implementing strict access controls. Security teams are advised to scan for unknown C++ backdoors and review search engine indexing for anomalies. Immediate mitigation includes isolating affected servers and conducting forensic analysis to identify the extent of the backdoor installation. Vigilance against SEO poisoning techniques is crucial for maintaining web infrastructure security. ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results

Linked Entities

  • GhostRedirector