mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.6K
active users

#eset

3 posts3 participants0 posts today

GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes

ESET researchers have identified a new threat actor named GhostRedirector that has compromised at least 65 Windows servers, primarily in Brazil, Thailand, and Vietnam. The actor utilizes two previously undocumented tools: a passive C++ backdoor called Rungan and a malicious Internet Information Services (IIS) module named Gamshen. While Rungan can execute commands on compromised servers, Gamshen's purpose is to manipulate search engine results, boosting the page ranking of configured target websites. The attacks appear to be opportunistic rather than targeting specific entities. GhostRedirector also employs public exploits like EfsPotato and BadPotato for privilege escalation. Based on various factors, including the use of Chinese strings and a Chinese code-signing certificate, ESET believes with medium confidence that GhostRedirector is a China-aligned threat actor.

Pulse ID: 68be866a4aa60fd497b3a8d7
Pulse Link: otx.alienvault.com/pulse/68be8
Pulse Author: AlienVault
Created: 2025-09-08 07:31:54

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes

ESET researchers have identified a new threat actor, GhostRedirector, targeting Windows servers with custom tools. The group has compromised at least 65 servers, mainly in Brazil, Thailand, and Vietnam, across various sectors. Their arsenal includes Rungan, a passive C++ backdoor, and Gamshen, a malicious IIS module for SEO fraud. GhostRedirector also uses public exploits for privilege escalation and creates rogue user accounts to maintain access. The attacks aim to manipulate Google search results, promoting gambling websites through shady SEO techniques. Evidence suggests GhostRedirector is a China-aligned actor, active since at least August 2024. The campaign demonstrates sophisticated tactics for server compromise and long-term access maintenance.

Pulse ID: 68ba2380ae861d314e902af1
Pulse Link: otx.alienvault.com/pulse/68ba2
Pulse Author: AlienVault
Created: 2025-09-04 23:40:48

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

For some time now I've been pondering the notion of ridding myself of #Microsoft anything in my life but comfort and familiarity kept me from doing so.

Thankfully the company has been making strides in feeding my hatred for them; with their constant bothering me with features I don't want/need, pushing their craptastic stochastic parrot tools in to everything that not even notepad is safe from it, making it hard to do simple things like logins because I refuse to use authenticator or outlook, burning boatloads of money in dumb stuff whilst firing their employees, wasting tons of energy and water to fuel their parrot's lies whilst stealing the works of authors, artists and many more to train the parrot's limited capabilities to deceive, lie and make shit up.

Anyways, so my two daily drivers are a couple of #Asus machines, a venerable 2 in 1 and a more recent vivobook. The old gal was barely running windows 10 and the new one was constantly dealing with windows 11 crapiness. The keyword or tense being was. They are both now running #linux - #endeavouros to be precise.

Have canceled my #eset license since I won't be needing it anymore and the #office365 as well.

So long Microsoft.

@sidalsolgun @daniel1820815 personally, if you actually want/need some "#Antivirus" on #Linux, consider #ESET's offering...

help.eset.com/eeau/12/en-US/
eset.com/us/business/download/

Personally, I consider Antivirus on Linux as #bloatware outside of #Fileserver and #eMail systems, but that's because I act as "#BenevolentDictator" and ban users from using external drives.

  • But that's me who actually invests the time and effort to educate #TechIlliterates and who's working in more sensitive IT than most.

So the tolerance to violations is near zero and proven willingful infraction of ITsec rules range from getting fired to jailtime in many situations.

  • Thus Antivirus, regardless in #ClamAV or commercial offerings, is not a threat when most systems require insiders (like modern "#Affiliate" #Ransomware) to plant them.
help.eset.comOverview | ESET Endpoint Antivirus for Linux 12ESET Endpoint Antivirus for Linux offers fast, efficient protection with On-demand and On-access scanning, ideal for Linux desktops.

#ClickFix went from virtually non-existent to the second most common attack vector blocked by #ESET, surpassed only by #phishing. This novel social engineering technique accounted for nearly 8% of all detections in H1 2025. #ESETresearch
ClickFix lures users by displaying bogus error messages followed by quick fix instructions, including copy-pasting malicious code. Running the code in the victim’s command line interpreter delivers malware such as #RATs, infostealers, and cryptominers.
Between H2 2024 and H1 2025, ESET’s detection for ClickFix, HTML/FakeCaptcha, skyrocketed by 517%. Most detections in ESET telemetry were reported from Japan (23%), Peru (6%), and Poland, Spain, and Slovakia (>5% each).
What makes #ClickFix so effective? The fake error message looks convincing; instructions are simple, yet the copied command is too technical for most users to understand. Pasting it into cmd leads to compromise with final payloads, including #DarkGate or #LummaStealer.
While #ClickFix was introduced by cybercriminals, it’s since been adopted by APT groups: Kimsuky, Lazarus; Callisto, Sednit; MuddyWater; APT36. NK-aligned actors used it to target developers, steal crypto and passwords from Metamask and #macOS Keychain.
#ClickFix uses psychological manipulation by presenting fake issues and offering quick solutions, which makes it dangerously efficient. It appears in many forms – error popups, email attachments, fake reCAPTCHAs – highlighting the need for greater vigilance online.
Read more in the #ESETThreatReport:
🔗 welivesecurity.com/en/eset-res