A newly identified threat cluster, GhostRedirector, has compromised over 65 Windows servers using the Rungan backdoor and Gamshen IIS module for SEO fraud-as-a-service. * Initial access is achieved via likely SQL injection, followed by PowerShell for tool delivery. * Gamshen manipulates search engine results for third-party gambling sites, damaging the compromised host's reputation. * The operation demonstrates persistence through multiple remote access tools and rogue user accounts. * Attribution points to a China-aligned actor, continuing a trend of IIS module-based SEO manipulation.