GhostRedirector hijacks Windows servers for SEO fraud

GhostRedirector hijacks Windows servers for SEO fraud
September 4, 2025 at 12:00 AM

ESET researchers uncovered GhostRedirector, a previously unknown, China-aligned threat actor abusing Windows servers to both backdoor systems and run SEO fraud. The group blends a passive C++ backdoor (Rungan) with a malicious native IIS module (Gamshen) to persist, execute commands, and secretly manipulate Google search rankings.

Key takeaways

  • At least 65 Windows servers were compromised (Dec 2024–Jun 2025), largely in Brazil, Thailand, Vietnam, Peru, and the USA (often as rented infrastructure).
  • Victims span multiple sectors: education, healthcare, insurance, transportation, technology, and retail.
  • Toolset includes: Rungan backdoor, Gamshen IIS module, privilege-escalation utilities leveraging EfsPotato/BadPotato, the Comdai helper library, Zunput site enumerator/webshell dropper, and GoToHTTP for remote access.
  • Medium-confidence attribution to a China-aligned actor based on Chinese strings, a code-signing certificate tied to a Chinese company, and Chinese-language artifacts.

How they get in

  • Likely initial access via SQL injection against public-facing apps.
  • Attackers abused sqlserver.exe (xp_cmdshell) to run PowerShell or CertUtil, pulling payloads from a staging infrastructure at 868id[.]com and related domains.

Privilege escalation and persistence

  • Custom .NET tools, often obfuscated with .NET Reactor and sometimes code-signed, used EfsPotato/BadPotato to add or elevate local admin users (e.g., MysqlServiceEx, MysqlServiceEx2, Admin) or hijack the Guest account via RID techniques.
  • Attackers created fallback access through rogue admin accounts, remote access software (GoToHTTP), and webshells dropped across active IIS sites.

Rungan: passive C++ backdoor

  • Installed as miniscreen.dll, Rungan registers HTTP Server API endpoints (bypassing IIS) and waits for exact HTTP requests to activate.
  • Capabilities include: creating users, executing commands via cmd, and registering new listener URLs. Communication is plaintext HTTP with hardcoded parameters.

Gamshen: native IIS module for SEO fraud

  • Intercepts requests only from Googlebot or Google referrers and only for non-static resources that match certain URL patterns.
  • Fetches base64-encoded content from brproxy.868id[.]com and injects it into the response to create manipulative backlinks and keyword-rich pages.
  • If content injection fails and a 404 would be returned, it redirects Googlebot to gobr.868id[.]com.
  • The likely endgame: boost rankings and traffic to third-party (gambling) sites through SEO fraud as a service without changing what regular visitors see.

Zunput: site mapper and webshell deployer

  • Enumerates IIS sites, confirms active dynamic content, and plants embedded ASP/PHP/JS webshells in those directories. Logs target details locally for later retrieval.

Comdai helper library

  • Shared across tools, providing user management, HTTP requests, pipe-based IPC, directory listing, and service/registry helpers. PDB paths and artifacts tie it to the same developer set.

Why attribution points to China

  • Chinese strings embedded in tools, a certificate issued to a Chinese company used for signing, and Chinese-language indicators in credentials. Overlap in victim regions and sectors with other China-aligned SEO fraud operations (e.g., DragonRank), but activity is tracked separately.

Defensive actions

  • Patch and harden public-facing apps; prioritize SQLi prevention and WAF rules.
  • Disable xp_cmdshell unless absolutely required; monitor sqlserver.exe invoking PowerShell/cmd.
  • Audit IIS: enumerate and validate all loaded native/managed modules; remove unknown DLLs.
  • Monitor HTTP Server API registrations (e.g., suspicious URLs like /v1.0/8888/sys.html).
  • Hunt for malicious admin accounts and RID hijacking; enforce LAPS and strong account hygiene.
  • Detect webshells in IIS site roots; baseline and alert on new .asp/.aspx/.php files.
  • Block and monitor staging/C2 domains linked to 868id[.]com and related infrastructure.
  • Review event logs, PowerShell transcripts, and EDR telemetry for download-and-execute chains.

Additional resources

  • ESET provides IoCs, sample hashes, and MITRE ATT&CK mappings (Resource Development, Initial Access via Exploit Public-Facing Application, Persistence via IIS module load, Defense Evasion via obfuscation, C2 over HTTP, and Impact via search result manipulation).

Source: WeLiveSecurity

Back…