
GhostContainer, a multi-functional backdoor built using open-source components, allows attackers full remote access to Exchange servers, enabling data theft and proxy tunneling while evading detection by posing as a legitimate server component with advanced stealth techniques
Kaspersky’s Global Research and Analysis Team (GReAT) has identified a previously unknown, sophisticated backdoor malware dubbed GhostContainer, designed to infiltrate Microsoft Exchange servers within government and high-tech environments across Asia. The discovery was made during an incident response operation and points to a likely cyber-espionage campaign.
GhostContainer is built using components from several open-source projects and operates as a multi-functional backdoor. Detected by Kaspersky as App_Web_Container_1.dll, the malware is capable of dynamic expansion through modular downloads. Once activated, it grants attackers full remote control of the Exchange server, enabling activities such as data theft, lateral movement, and proxy tunneling.
To evade detection, GhostContainer disguises itself as a legitimate server component and employs advanced stealth techniques. Its ability to function as a proxy raises concerns about internal network exposure and potential exfiltration of sensitive information, especially within high-value institutional targets.
Sergey Lozhkin, Head of GReAT for APAC and META at Kaspersky, stated, “Our analysis shows the attackers possess deep expertise in manipulating Exchange systems and integrating open-source tools to build highly customized espionage malware. We are closely tracking this threat to understand its scope and impact.”
Although attribution remains unclear, GhostContainer does not currently link to any known threat actor or infrastructure. The use of widely accessible open-source code makes it difficult to pinpoint the perpetrators. Kaspersky also noted a concerning trend — a 48% year-on-year rise in malicious open-source packages, with 14,000 such instances detected by the end of 2024.
Kaspersky’s key security recommendations
In response, Kaspersky advises organizations to strengthen their defenses through proactive threat intelligence and advanced security practices:
· Equip security teams with real-time threat intelligence via platforms like Kaspersky Threat Intelligence.
· Enhance team capabilities with expert-led online training to combat advanced threats.
· Deploy endpoint detection and response (EDR) tools such as Kaspersky EDR to identify and mitigate incidents efficiently.
· Implement network-level defenses, including the Kaspersky Anti Targeted Attack Platform, to catch sophisticated threats early.
· Conduct regular security awareness training to reduce the risk of phishing and social engineering attacks.
As advanced persistent threats continue to evolve, Kaspersky urges organizations to remain vigilant and adopt a multi-layered cybersecurity strategy.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.