Vietnam.vn - Nền tảng quảng bá Việt Nam

GhostContainer: New vulnerability attacks Microsoft Exchange servers via backdoor malware

Kaspersky's Global Research and Analysis Team (GReAT) has discovered a new backdoor malware called GhostContainer, built on open source tools, a sophisticated malware that has never been discovered before.

Báo Sài Gòn Giải phóngBáo Sài Gòn Giải phóng25/07/2025

According to Kaspersky, it is not yet possible to assign responsibility to any hacker group because the attackers did not show any signs of penetrating any infrastructure.
According to Kaspersky, it is not yet possible to assign responsibility to any hacker group because the attackers did not show any signs of penetrating any infrastructure.

The GReAT team discovered the malware during incident response efforts at government systems that used Microsoft Exchange. GhostContainer is believed to be part of a sophisticated and persistent advanced persistent threat (APT) campaign targeting key organizations in the Asia region, including major technology companies.

The malicious file discovered by Kaspersky, called App_Web_Container_1.dll, is actually a multi-functional backdoor that can be extended by downloading additional modules remotely. The malware takes advantage of many open source projects and is sophisticatedly customized to avoid detection.

Kaspersky photo 1 - GhostContainer discovered Kaspersky identifies a new backdoor targeting Microsoft Exchange servers.jpg

Once GhostContainer is successfully installed on a system, hackers can easily gain complete control of the Exchange server, from which they can perform a series of dangerous actions without the user's knowledge. This malware is cleverly disguised as a valid server component and uses many surveillance evasion techniques to avoid detection by antivirus software and bypass security monitoring systems.

In addition, this malware can act as an intermediary server (proxy) or an encrypted tunnel (tunnel), creating loopholes for hackers to penetrate internal systems or steal sensitive information. Looking at this way of operating, experts suspect that the main purpose of this campaign is most likely cyber espionage.

“Our in-depth analysis shows that the perpetrators are highly proficient in penetrating Microsoft Exchange servers. They leverage a variety of open source tools to penetrate IIS and Exchange environments, and have developed sophisticated spying tools based on available open source code. We will continue to monitor the group’s activities, as well as the scope and severity of their attacks, to better understand the overall threat landscape,” said Sergey Lozhkin, Head of the Global Research and Analysis Team (GReAT) for Asia Pacific and Middle East and Africa at Kaspersky.

GhostContainer uses code from multiple open source projects, making it highly vulnerable to cybercriminal groups or APT campaigns anywhere in the world . Notably, by the end of 2024, a total of 14,000 malware packages were detected in open source projects, up 48% from the end of 2023. This number shows that the level of risk is increasing in the field.

Source: https://www.sggp.org.vn/ghostcontainer-lo-hong-moi-tan-cong-may-chu-microsoft-exchange-thong-qua-ma-doc-backdoor-post805372.html


Comment (0)

No data
No data
The powerful formation of 5 SU-30MK2 fighters prepares for the A80 ceremony
S-300PMU1 missiles on combat duty to protect Hanoi's sky
Lotus blooming season attracts tourists to the majestic mountains and rivers of Ninh Binh
Cu Lao Mai Nha: Where wildness, majesty and peace blend together
Hanoi is strange before storm Wipha makes landfall
Lost in the wild world at the bird garden in Ninh Binh
Pu Luong terraced fields in the pouring water season are breathtakingly beautiful
Asphalt carpets 'sprint' on North-South highway through Gia Lai
PIECES of HUE - Pieces of Hue
Magical scene on the 'upside down bowl' tea hill in Phu Tho

Heritage

Figure

Business

No videos available

News

Political System

Local

Product