Sep 04, 2025 • ESET WeLiveSecurity
GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes
ESET researchers have uncovered a new campaign dubbed GhostRedirector targeting Windows servers. This threat involves a passive C++ backdoor and a malicious...
Executive Summary
ESET researchers have uncovered a new campaign dubbed GhostRedirector targeting Windows servers. This threat involves a passive C++ backdoor and a malicious Internet Information Services (IIS) module designed to manipulate Google search results. The primary impact involves server compromise and SEO poisoning, potentially redirecting traffic to malicious sites or compromising server integrity. The attack vector leverages server-side vulnerabilities to establish persistence through IIS modules. Organizations hosting Windows servers should prioritize patching IIS services, monitoring for unauthorized modules, and implementing strict access controls. Security teams are advised to scan for unknown C++ backdoors and review search engine indexing for anomalies. Immediate mitigation includes isolating affected servers and conducting forensic analysis to identify the extent of the backdoor installation. Vigilance against SEO poisoning techniques is crucial for maintaining web infrastructure security.
Summary
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results
Published Analysis
ESET researchers have uncovered a new campaign dubbed GhostRedirector targeting Windows servers. This threat involves a passive C++ backdoor and a malicious Internet Information Services (IIS) module designed to manipulate Google search results. The primary impact involves server compromise and SEO poisoning, potentially redirecting traffic to malicious sites or compromising server integrity. The attack vector leverages server-side vulnerabilities to establish persistence through IIS modules. Organizations hosting Windows servers should prioritize patching IIS services, monitoring for unauthorized modules, and implementing strict access controls. Security teams are advised to scan for unknown C++ backdoors and review search engine indexing for anomalies. Immediate mitigation includes isolating affected servers and conducting forensic analysis to identify the extent of the backdoor installation. Vigilance against SEO poisoning techniques is crucial for maintaining web infrastructure security. ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results
Linked Entities
- GhostRedirector