logo
Kaspersky Uncovers GhostContainer Backdoor That Targets Microsoft Exchange Servers

Kaspersky Uncovers GhostContainer Backdoor That Targets Microsoft Exchange Servers

Kaspersky's Global Research and Analysis Team (GReAT) has uncovered a new backdoor based on open-source tools, dubbed GhostContainer. The previously unknown highly customized malware was discovered during an incident response (IR) case, targeting Exchange infrastructure within government environments. The malware may be part of an advanced persistent threat (APT) campaign targeting high-value entities in Asia, including high-tech companies.
The file detected by Kaspersky as App_Web_Container_1.dll turned out to be a sophisticated, multi-functional backdoor that leverages several open-source projects and can be dynamically extended with arbitrary functionality through additional module downloads.
Once loaded, it provides attackers with full control over the Exchange server, enabling a wide range of malicious activities. To avoid detection by security solutions, it uses several evasion techniques and presents itself as a legitimate server component to blend in with normal operations. In addition, it can act as a proxy or tunnel, potentially exposing the internal network to external threats or facilitating the exfiltration of sensitive data from internal systems. Therefore, сyber espionage is suspected to be the aim of the campaign.
'Our in-depth analysis revealed that the attackers are highly skilled at exploiting Exchange systems and leveraging various open-source projects related to infiltrating IIS and Exchange environments, as well as creating and enhancing sophisticated espionage tools based on publicly available code. We will continue monitoring their activity, along with the scope and scale of these attacks, to gain a better understanding of the threat landscape,' comments Sergey Lozhkin, Head of GReAT, APAC & META.
At this time, it is not possible to attribute GhostContainer to any known threat actor group, as the attackers have not exposed any infrastructure. The malware incorporates code from several publicly accessible open-source projects, which could be leveraged by hackers or APT groups worldwide. Notably, by the end of 2024, a total of 14,000 malicious packages were identified in open-source projects — a 48% increase compared to the end of 2023 — highlighting the growing threat in this area.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Corporate and academic teams welcome to register in a new Kaspersky contest
Corporate and academic teams welcome to register in a new Kaspersky contest

Zawya

time2 days ago

  • Zawya

Corporate and academic teams welcome to register in a new Kaspersky contest

Kaspersky announces the registration opening for its brand-new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation. The competition will run in five regional streams, with the winning teams of each stream getting a unique opportunity to join the finals as part of Kaspersky's Security Analyst Summit in Thailand on October 25-28 and compete for an $18,000 prize pool. In an era where cyberthreats continue to evolve, Kaspersky remains committed to fostering cybersecurity talent and upskilling cybersecurity professionals worldwide to help them counter the constantly developing threat landscape. In May, Kaspersky hosted SAS CTF (Security Analyst Summit Capture the Flag) qualifiers for the community of cybersecurity researchers, defining eight teams that will meet at the finals. The new CTF competition — Kaspersky{CTF} — is designed to reach out to an even broader audience of researchers and bring together teams from academic and corporate fields, offering a platform for both rising talents and established experts to test their skills on a grand scale. Registration for the competition is open for the participating teams, here. To register their team, potential participants should choose one of the regional streams: North America, South America and the Caribbean Europe The Middle East, Turkiye and Africa Russia and the CIS Asia and Oceania To complete registration, all participants will have to verify their affiliation with a recognized institution or organization, using emails with corporate or academic domains. On August 30-31, the teams, that passed the registration, will step up to the 24-hour online CTF tournament that will define regional winners. During the challenge, they will face cutting-edge cybersecurity tasks, ranging from cryptography and reverse engineering to web security, and undoubtedly AI. The META stream of the competition is organized with the support of the UAE Cyber Security Council. The Council plays a vital role in securing the nation's digital transformation and supporting initiatives that enhance cyber resilience within the local market. H.E Dr. Mohamed Al Kuwaiti, Head of the UAE Cyber Security Council, stated: "The UAE Cyber Security Council is committed to fostering a resilient and forward-looking cyber environment". He added: "We recognize the critical importance of nurturing cybersecurity talent and commend initiatives like the Kaspersky CTF for empowering cybersecurity professionals and strengthening community cooperation". The winners of five regional Kaspersky{CTF} streams will have an opportunity to receive an exclusive invitation and travel coverage to the SAS CTF 2025 on-site finals in Thailand to compete for the main prize together with eight SAS CTF finalists. "Organizations supporting or participating in CTFs not only strengthen internal cyber capabilities but also signal a proactive commitment to talent development and industry leadership. For young researchers, Kaspersky{CTF} is a unique opportunity to meet the real-world challenges and realize that work in cybersecurity is worth it," commented Igor Kuznetsov, Director of Kaspersky's Global Research & Analysis Team. In preparation for the main event, Kaspersky will organize a series of educational sessions designed to enhance participants' competitive readiness. These webinars will cover teaser tasks and strategies for effective CTF performance at SAS CTF finals. About Kaspersky Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky's deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect individuals, businesses, critical infrastructure, and governments around the globe. The company's comprehensive security portfolio includes leading digital life protection for personal devices, specialized security products and services for companies, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help millions of individuals and over 200,000 corporate clients protect what matters most to them.

APT41 Espionage Strikes Southern African Government IT
APT41 Espionage Strikes Southern African Government IT

Arabian Post

time2 days ago

  • Arabian Post

APT41 Espionage Strikes Southern African Government IT

A sophisticated cyber‑espionage campaign has targeted a government‑affiliated IT department in Southern Africa, with indicators pointing to the China‑linked APT41 group. Kaspersky's Managed Detection and Response team detected the intrusion via unusual activity on multiple workstations, prompting an in‑depth investigation and attribution to APT41 with high confidence. The attackers infiltrated the network by exploiting a publicly exposed web server, carrying out registry dumping to harvest credentials for a local administrator account and a backup solution account with domain‑wide privileges. These credentials enabled lateral movement and elevation of access across the organisation's network. Once embedded, the threat actors deployed a suite of both custom and public reconnaissance tools. A modified Pillager stealer was converted into a DLL to exfiltrate browser, database and admin tool credentials, screenshots, source code, active chats, email correspondence, and more. Additionally, the Checkout stealer captured browser history, downloaded files, stored passwords and credit card information. The attackers also utilised RawCopy and a Mimikatz DLL to extract registry secrets, while Cobalt Strike served as their primary command‑and‑control mechanism. ADVERTISEMENT Unusually, the attackers leveraged the internal SharePoint server as a covert C2 channel, embedding a custom web‑shell to send and receive commands. This tactic allowed them to mask illicit operations within legitimate internal communications, minimising suspicion. Further probing revealed use of Impacket modules WmiExec and Atexec, which fetched reconnaissance outputs and exfiltrated SAM and SYSTEM registry hives from compromised hosts. A later phase of the operation involved the deployment of a malicious HTA file via a domain impersonating GitHub, used to establish a reverse shell—locking down persistent access. This marks one of APT41's most comprehensive operations in Africa, a region previously experiencing minimal activity from this actor. Analysts highlight the full deployment of the group's TTPs—spanning stealthy reconnaissance, lateral movement, data harvesting, and covert command channels. Denis Kulik, Lead SOC Analyst at Kaspersky MDR, emphasised the challenge such campaigns present: 'Defending against such sophisticated attacks is impossible without comprehensive expertise and continuous monitoring of the entire infrastructure'. Culprits' integration of both bespoke stealer implants and legitimate tools like Mimikatz and Cobalt Strike underlines their adaptive and stealthy approach. The incident underscores growing cyber‑espionage interest in African government IT systems. APT41, active across 42 countries, now appears to be intensifying surveillance operations on the continent. Organisations are urged to ensure full security agent deployment across endpoints, enforce least privilege principles, and monitor internal services rigorously. Kaspersky also recommends adopting advanced solutions such as EDR/XDR and managed detection and response services, along with threat intelligence offerings to anticipate and counter complex intrusions.

Kaspersky: Advanced Persistent Threat (APT41) targets Southern African organisation in espionage attack
Kaspersky: Advanced Persistent Threat (APT41) targets Southern African organisation in espionage attack

Zawya

time3 days ago

  • Zawya

Kaspersky: Advanced Persistent Threat (APT41) targets Southern African organisation in espionage attack

Kaspersky Managed Detection and Response experts ( have observed a cyber espionage attack on an organisation in Southern African and have linked it to the Chinese-speaking APT41 group. Although the threat actor has shown limited activity in Southern Africa, this incident reveals that the cyber attackers have targeted government IT services in one of the countries in the region, attempting to steal sensitive corporate data — including credentials, internal documents, source code, and communications. APT (Advanced Persistent Threat) is a category of threat actors known for carrying out concerted, stealthy, and ongoing attacks against specific organisations, as opposed to opportunistic, isolated incidents that account for most cybercriminal activity. The adversaries' techniques observed during the attack in Southern Africa allowed Kaspersky to attribute it to the Chinese-speaking APT41 group with a high confidence. The primary goal of the attack was cyber espionage, which is typical for this threat actor. The attackers attempted to collect sensitive data from the machines they compromised within the organisation's network. It is noteworthy that APT41 typically has been showing quite limited activity in the Southern African region. APT41 specialises in cyber espionage and targets organisations across various industries, including telecommunications providers, educational and healthcare institutions, IT, energy, and other sectors, with known activity in at least 42 countries. Based on Kaspersky experts' analysis, the attackers may have gained access to the organisation's network through a web server exposed to the Internet. Using a credential harvesting technique – known in professional terms as registry dumping – the attackers obtained two corporate domain accounts: one with local administrator rights on all workstations and another belonging to a backup solution, which had domain administrator privileges. These accounts allowed the attackers to compromise additional systems within the organisation. One of the stealers used for data collection was a modified Pillager utility, designed for exporting and decrypting data. The attackers compiled its code from an executable file into a Dynamic Link Library (DLL). With it, they aimed to gather saved credentials from browsers, databases, administrative tools, as well as project source code, screenshots, active chat sessions and their data, email correspondence, lists of installed software, operating system credentials, Wi-Fi credentials, and other information. The second stealer used during the attack was Checkout. In addition to saved credentials and browser history, it was also capable of collecting information on downloaded files and browser-stored credit card data. The attackers also used the RawCopy utility and a version of Mimikatz compiled as a Dynamic Link Library (DLL) to dump registry files and credentials, as well as Cobalt Strike for Command and Control (C2) communication on compromised hosts. 'Interestingly, as one of their C2 communication channels besides Cobalt Strike, the attackers chose the SharePoint server within the victim's infrastructure. They communicated with it using custom C2 agents connected with a web-shell. They may have chosen SharePoint because it was an internal service already present in the infrastructure and unlikely to raise suspicion. Moreover, in that case, it probably offered the most convenient way to exfiltrate data and control compromised hosts through a legitimate communication channel,' explains Denis Kulik, Lead SOC Analyst at Kaspersky Managed Detection and Response service. 'In general, defending against such sophisticated attacks is impossible without comprehensive expertise and continuous monitoring of the entire infrastructure. It is essential to maintain full security coverage across all systems with solutions capable of automatically blocking malicious activity at an early stage — and to avoid granting user accounts excessive privileges,' comments Denis Kulik. To mitigate or prevent similar attacks, organisations are advised to follow these best practices: Ensure that security agents are deployed on all workstations within the organisation without exception, to enable timely incident detection and minimise potential damage. Review and control service and user account privileges, avoiding excessive rights assignments – especially for accounts used across multiple hosts within the infrastructure. To protect the company against a wide range of threats, use solutions from the Kaspersky Next ( product line that provide real-time protection, threat visibility, investigation and the response capabilities of EDR and XDR for organisations of any size and industry. Depending on your current needs and available resources, you can choose the most relevant product tier and easily migrate to another one if your cybersecurity requirements are changing. Adopt managed security services by Kaspersky such as Compromise Assessment ( Managed Detection and Response (MDR) ( and / or Incident Response ( covering the entire incident management cycle – from threat identification to continuous protection and remediation. They help to protect against evasive cyberattacks, investigate incidents and get additional expertise even if a company lacks cybersecurity workers. Provide your InfoSec professionals with an in-depth visibility into cyberthreats targeting your organisation. The latest Kaspersky Threat Intelligence ( will provide them with rich and meaningful context across the entire incident management cycle and helps them identify cyber risks in a timely manner. A detailed analysis of the incident is available on Securelist ( Kaspersky Managed Detection and Response service monitors suspicious activity and helps organisations respond swiftly to minimise impact. This is a part of Kaspersky Security Services, a team delivering hundreds of information security projects every year for Fortune Global 500 organisations: incident response, managed detection, SOC consulting, red teaming, penetration testing, application security, digital risks protection. Distributed by APO Group on behalf of Kaspersky. For further information please contact: Nicole Allman nicole@ Social Media: Facebook: X: YouTube: Instagram: Blog: About Kaspersky: Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky's deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect individuals, businesses, critical infrastructure, and governments around the globe. The company's comprehensive security portfolio includes leading digital life protection for personal devices, specialized security products and services for companies, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help millions of individuals and over 200,000 corporate clients protect what matters most to them. Learn more at

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store