#Gootloader

2025-11-06

Gootloader - ein JavaScript‑basierter Malware‑Loader - ist mit neuen "Tricks" wieder zurück, berichtet gootloader.wordpress.com/2025/
Gootloader werde über kompromittierte oder vom Angreifer kontrollierte Websites verbreitet verleite Benutzer:innen dazu, Malware - gern als Ransomware - verseuchte Dokumente herunterzuladen.

Die Websites werden in Suchmaschinen entweder über Anzeigen oder über Suchmaschinenoptimierung (SEO‑Poisoning) beworben, wodurch sie für bestimmte Schlüsselwörter wie „rechtliche Dokumente“ und „Verträge“ höher im Ergebnis erscheinen.
Also: Vorsicht mit Websites, die rechtliche Dokumente zum Download anbieten.

#infosec #infosecnews #gootloader #malware #Ransomware #BeDiS

2025-11-06

Alright team, it's been a pretty active 24 hours in the cyber realm! We've got a few notable breaches, some clever new malware tactics, critical vulnerabilities from Cisco, and a stark reminder about password hygiene. Let's dive in:

Recent Cyber Attacks and Breaches ⚠️

- Hyundai AutoEver America suffered a data breach, with attackers accessing personal information including names, Social Security Numbers, and driver's licenses. The intrusion, discovered on March 1st, had been ongoing since February 22nd.
- Japanese media giant Nikkei also disclosed a breach where malware on an employee's laptop led to stolen Slack credentials, exposing the personal details (names, emails, chat histories) of over 17,000 employees and partners. This highlights the growing risk of collaboration platforms as attack vectors.
- SonicWall confirmed that state-sponsored threat actors were behind their September cloud backup breach, accessing firewall configuration files via an API call. While initially downplayed, it's now clear all customers using the cloud backup service were affected, though SonicWall insists no product, firmware, or source code was impacted.
- Russia's Sandworm (APT44) has been deploying data-wiping malware (like ZeroLot and Sting) against Ukraine's critical grain sector, as well as government, energy, and logistics entities. This marks a strategic shift to target Ukraine's economy, with initial access sometimes facilitated by UAC-0099.
- The State of Nevada government successfully recovered from a ransomware attack in August without paying the ransom, incurring $259,000 in overtime costs and $1.3 million in vendor support. The initial compromise in May stemmed from an employee downloading a trojanised system administration tool via a malicious Google ad, leading to a hidden backdoor and eventual ransomware deployment after backups were deleted.
- An Italian communications executive, Francesco Nicodemo, revealed he was targeted with Paragon's Graphite spyware, making him the fifth known Italian victim in a scandal involving political targeting. WhatsApp had notified 90 individuals globally about evidence of similar targeting.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🕵🏼 The Register | go.theregister.com/feed/www.th
📰 The Hacker News | thehackernews.com/2025/11/soni
🕵🏼 The Register | go.theregister.com/feed/www.th
🤫 CyberScoop | cyberscoop.com/sonicwall-custo
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🗞️ The Record | therecord.media/russia-sandwor
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🗞️ The Record | therecord.media/nevada-decline
🗞️ The Record | therecord.media/italy-comms-ex

New Threat Research on Malware and Techniques 🛡️

- The Gootloader malware operation has resurfaced after a seven-month hiatus, continuing its SEO poisoning campaigns to distribute malicious JavaScript files disguised as legal documents. New evasion tactics include using special web fonts to obfuscate filenames in HTML source and crafting malformed Zip archives that unpack differently for Windows Explorer versus analysis tools. It's now dropping the Supper SOCKS5 backdoor, linked to ransomware affiliates like Vanilla Tempest, known for rapid network compromise.
- The Russia-aligned threat actor Curly COMrades is using an innovative evasion technique: weaponising Windows Hyper-V to deploy hidden, lightweight Alpine Linux virtual machines. These VMs host custom reverse shells (CurlyShell) and reverse proxies (CurlCat), effectively isolating malware execution and bypassing host-based EDR detections.
- A new Russia-aligned cluster, InedibleOchotense (possibly a Sandworm sub-cluster), is conducting spear-phishing attacks against Ukrainian entities using trojanised ESET installers. These installers drop the Kalambur (SUMBUR) C# backdoor, which uses Tor for C2 and enables OpenSSH/RDP access. Separately, RomCom (Storm-0978) has been weaponising a WinRAR vulnerability (CVE-2025-8088) in Europe and Canada, deploying various backdoors.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu
📰 The Hacker News | thehackernews.com/2025/11/hack
📰 The Hacker News | thehackernews.com/2025/11/troj

Vulnerabilities and Active Exploitation 🚨

- Cisco has issued patches for two critical vulnerabilities in its Unified Contact Center Express (UCCX) software. CVE-2025-20354 (CVSS 9.8) is an RCE flaw in the Java RMI process, allowing unauthenticated attackers to execute arbitrary commands as root. CVE-2025-20358 (CVSS 9.4) is an authentication bypass, enabling unauthenticated attackers to run scripts as a non-root user. While not yet exploited in the wild, immediate patching (to 12.5 SU3 ES07 or 15.0 ES01) is strongly advised.
- Cisco also warned of a "new attack variant" targeting its ASA and FTD firewalls, exploiting previously patched flaws (CVE-2025-20333 and CVE-2025-20362). These attacks, ongoing for at least six months and linked to the government-backed ArcaneDoor threat crew (UAT4356), now cause devices to continually reload, leading to denial-of-service. Attackers have used zero-days, disabled logging, intercepted CLI commands, intentionally crashed devices, and even modified ROM Monitor for persistence.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🕵🏼 The Register | go.theregister.com/feed/www.th

Threat Landscape Commentary 📉

- A Comparitech report analysing over two billion leaked passwords in 2025 confirms that "123456", "admin", and "password" remain among the most common. A quarter of passwords were number-only, and 38% contained "123". This highlights persistent poor password hygiene, emphasising the need for longer passphrases or, ideally, biometric passkeys.

🕵🏼 The Register | go.theregister.com/feed/www.th

Data Privacy and Regulatory Issues 🔒

- The EU Parliament's Civil Liberties Committee (LIBE) has voted to advance a controversial proposal expanding Europol's data sharing and biometric data collection capabilities. While aimed at combating human trafficking and migrant smuggling, privacy advocates warn it could facilitate mass surveillance and significant data privacy violations across Europe.
- In a decisive move against cybercrime, a Chinese court has sentenced five leaders of a Myanmar crime syndicate to death. The syndicate ran industrial-scale scamming compounds near the China-Myanmar border, defrauding over $4 billion and causing six deaths, highlighting Beijing's severe crackdown on cross-border cyber fraud.

🗞️ The Record | therecord.media/eu-parliament-
🗞️ The Record | therecord.media/china-sentence

#CyberSecurity #ThreatIntelligence #DataBreach #Ransomware #Malware #APT #NationState #Vulnerabilities #Cisco #Gootloader #Sandworm #Europol #DataPrivacy #InfoSec #CyberAttack #IncidentResponse

2025-11-05

Gootloader’s back—and it’s smarter. The new GootBot variant is evading defenses and targeting industries like healthcare. Are we ready for what’s next?

thedefendopsdiaries.com/gootlo

#gootloader
#malwaretrends
#cybersecurity2024
#threatintelligence
#infosec
#gootbot
#seoattacks
#healthcaresecurity
#ransomware

2025-11-05

Gootloader is back with a vengeance—this time featuring the stealthy GootBot that spreads through networks and ups its SEO poisoning game. With targets from legal to healthcare, are we ready for its next-gen tactics?

thedefendopsdiaries.com/gootlo

#gootloader
#malwaretrends
#cybersecurity2024
#threatintelligence
#infosec
#gootbot
#seoattacks
#healthcaresecurity
#ransomware

🛡️ Business security requires dealing with different types of threats, from mobile #malware to Python-based stealers. Let us show you exactly how you can do it 👨‍💻

Check out analysis of several hard-to-catch threats, including #GootLoader ⬇️
any.run/cybersecurity-blog/how

#infosec #cybersecurity

Teddy / Domingo (🇨🇵/🇬🇧)TeddyTheBest@framapiaf.org
2025-04-03

#Gootloader #Malware Resurfaces in #Google Ads for Legal Docs. Attackers target a familiar industry, law professionals, by hiding the infostealer in ads delivered via Google-based malvertising.
darkreading.com/cyberattacks-d

2025-03-31

Sharing a community blog for visibility: gootloader.wordpress.com/2025/

Proofpoint also recently observed this activity delivering #GootLoader. Google Ads for a fake document creation app (lawliner[.]com) led to a malicious document creation website, on which users are directed to enter their email address.

When an email address is provided, the user will receive an email from the fake document creation website (lawyer@skhm[.])org with URL ending in .docx. Under certain conditions, the URL will lead to a zip file with a JavaScript file that installs GootLoader, while at other times it will lead to an actual docx template used as a decoy. It is not possible to see from the email or URL if it will lead to the malicious file or not.

Proofpoint recommends organizations block these domains. Also, people should be advised to never use untrusted / unapproved software for document creation.

I've been waiting for this writeup for a long time. Great dive on #Gootloader: news.sophos.com/en-us/2025/01/

Of particular note is the 24-hour timeout for any IP that receives a Gootloader download prompt, frustrating research attempts. But the whole research process here is excellent.

2025-01-16

We don't want to tell the entire story here, but the bottom line is this: #Gootloader is and remains one of the most convoluted #malware attack methods we've seen. Its social engineering ruse and the way it shapes itself to your desires still convince people to click its bad links.

Gootloader has been playing the long game, and winning, below most people's radar, for years. It shows no sign of slowing down or changing its methods. After all, it's a working formula.

/end

news.sophos.com/en-us/2025/01/

2025-01-16
2025-01-16
2025-01-16
2025-01-16
2025-01-16
2025-01-16

Hi everyone, it's @threatresearch driving the X-Ops social media today to let you know about a story we just published, written by my colleague Gabor Szappanos.

Szapi has done significant research in the past into a #malware family called #Gootloader that (for years, now) uses malicious #SEO techniques to promote compromised websites into Google search results.

This research finally cracks wide open the mystery of how they manage to do that so effectively. It's a long read, but well worth the deep dive.

news.sophos.com/en-us/2025/01/

1/

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst