GhostRedirector Hackers Target Windows Servers via IIS and SEO Fraud

Researchers at ESET have uncovered a likely China-linked cyber group dubbed GhostRedirector, which since August 2024 has compromised at least 65 Windows servers running IIS to manipulate Google search rankings in favor of iGaming websites.
The main targets so far are located in Brazil, Vietnam, and Thailand.
Who Are GhostRedirector
According to ESET, GhostRedirector is a newly identified group, first spotted in late 2024. Evidence strongly suggests ties to China. The attacks involve custom tools, privilege-escalation exploits, and the deployment of malicious modules into IIS (Internet Information Services).
Indicators of Chinese Origin
- Chinese-language strings were found in the code.
- A certificate issued by a Chinese company was used.
- Account passwords included the word “huang” (Chinese for “yellow”).
Main Tools Used by the Group
The Rungan Backdoor
Rungan is a passive C++ backdoor designed to execute commands on the compromised server. Its primary role is to maintain persistent access and control.
The Gamshen Module
Gamshen is injected into IIS as a native module. Its purpose is SEO fraud: it modifies server responses specifically for Googlebot, inserting links to online casinos and gambling sites. For normal visitors, the pages appear unchanged.
This allows attackers to stealthily boost gambling sites in search rankings while damaging the reputation of the compromised servers by associating them with black-hat SEO schemes.
Attack Methods
Initial Access
ESET analysts believe GhostRedirector gains entry via SQL injection. Malicious files are then downloaded from a command server using PowerShell or the CertUtil tool.
Privilege Escalation
The exploits BadPotato and EfsPotato were used to escalate privileges. This enabled attackers to create hidden admin-level accounts, install additional malware, and maintain access even if the backdoor was removed.
Attack Tools
Tool | Purpose |
---|---|
Rungan | Execute commands on the server, provide covert access |
Gamshen | SEO fraud, promote gambling sites |
BadPotato / EfsPotato | Privilege escalation, creation of hidden accounts |
GoToHTTP | Remote browser-based connection to the server |
Geographic Spread of Attacks
As of June 2025, ESET reported at least 65 compromised servers. The majority of victims are located in:
- Brazil,
- Vietnam,
- Thailand,
- Peru,
- United States.
Isolated cases were also observed in Canada, India, Finland, the Netherlands, the Philippines, and Singapore.
Affected organizations span multiple industries, including insurance, healthcare, transportation, education, retail, and technology.
Consequences of the Attacks
While end users were not directly infected, the server compromises resulted in:
- Damage to organizational reputation;
- Decreased trust from search engines;
- Involvement in gray-hat SEO schemes;
- Potential loss of administrative control over systems.
Conclusions
GhostRedirector relies on a mix of backdoors, exploits, and IIS modules to push iGaming websites. Experts believe the campaign was large-scale and targeted servers with vulnerable software.
Microsoft has warned that malicious IIS modules are especially difficult to detect since they run with high-level privileges at the server layer.