GhostContainer Malware Targets Asian Government Networks

Red | Attack Report
Download PDF

A stealthy and highly sophisticated malware dubbed GhostContainer has been discovered targeting Microsoft Exchange servers in government and high-tech environments across Asia. This backdoor blends seamlessly into normal operations, making it incredibly hard to detect, while allowing attackers to maintain long-term access, all without ever reaching out to an external command-and-control server. By exploiting a known Exchange vulnerability and using open-source tools to create fake web pages for covert communication, the attackers built a custom malware ecosystem tailored for espionage. GhostContainer’s ability to bypass security controls, hide in plain sight, and operate without traditional indicators highlights the work of a well-resourced, highly skilled adversary aiming for stealth and persistence.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox

Cyber Horizons 2025

What Last Year’s Attacks Reveal About Today’s Risks

Watch the Webinar on-demand and get a FREE copy of our Cyber Horizons 2025 report.

Our Speakers
Speaker 1

Prateek Bhajanka Global Field CISO & Former Gartner Analyst Hive Pro Inc.

Speaker 2

Ankit Mani Manager Threat Intel HiveForce Labs

Speaker 3

Sreevani Tonipe Senior Threat Researcher HiveForce Labs