• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
australian healthcare sector targeted in latest gootkit malware attacks

Australian Healthcare Sector Targeted in Latest Gootkit Malware Attacks

You are here: Home / General Cyber Security News / Australian Healthcare Sector Targeted in Latest Gootkit Malware Attacks
January 11, 2023

A wave of Gootkit malware loader attacks has focused the Australian health care sector by leveraging reputable equipment like VLC Media Player.

Gootkit, also named Gootloader, is recognised to make use of research engine optimization (Seo) poisoning tactics (aka spamdexing) for initial entry. It typically performs by compromising and abusing reputable infrastructure and seeding these web pages with prevalent keyword phrases.

Like other malware of its type, Gootkit is capable of stealing info from the browser, executing adversary-in-the-browser (AitB) attacks, keylogging, getting screenshots, and other destructive actions.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Trend Micro’s new results reveal that the key phrases “hospital,” “wellbeing,” “medical,” and “business agreement” have been paired with several city names in Australia, marking an malware’s expansion outside of accounting and law firms.

The starting position of the cyber assault is to immediate consumers hunting for the same keywords and phrases to an contaminated WordPress web site that tips them into downloading malware-laced ZIP information.

“Upon accessing the site, the consumer is introduced with a display screen that has been produced to appear like a legitimate discussion board,” Craze Micro researchers stated. “Users are led to accessibility the backlink so that the malicious ZIP file can be downloaded.”

Gootkit Malware Attacks

What’s extra, the JavaScript code that is applied to pull off this trickery is injected into a legitimate JavaScript file at random sections on the breached internet site.

The downloaded ZIP archive, for its element, also incorporates a JavaScript file that, on execution, not only employs obfuscation to evade assessment, but is even more made use of to establish persistence on the device by implies of a scheduled job.

The execution chain subsequently sales opportunities to a PowerShell script which is designed to retrieve data files from a distant server for write-up-exploitation activity, which commences only immediately after a ready time period that ranges from a couple of hours to as extensive as two times.

“This latency, which obviously separates the initial an infection phase from the next stage, is a distinct function of Gootkit loader’s operation,” the scientists mentioned.

The moment the wait time elapses, two supplemental payloads are dropped – msdtc.exe and libvlc.dll – the previous of which is a genuine VLC Media Player binary which is employed to load the Cobalt Strike DLL part, followed by downloading far more applications to aid discovery.

“The malicious actors driving [Gootkit] are actively employing their marketing campaign,” the researchers reported. “The threats targeting precise task sectors, industries, and geographic spots are becoming far more aggressive.”

Identified this post intriguing? Adhere to us on Twitter  and LinkedIn to go through more exclusive content material we put up.


Some sections of this post are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Customer and Employee Data the Top Prize for Hackers – Imperva
Next Post: Sensitive Files From San Francisco Transit Police Allegedly Leaked Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks
  • How to Interpret the 2023 MITRE ATT&CK Evaluation Results
  • Iranian Nation-State Actor OilRig Targets Israeli Organizations
  • High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server
  • Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable
  • Mysterious ‘Sandman’ Threat Actor Targets Telecom Providers Across Three Continents
  • Researchers Raise Red Flag on P2PInfect Malware with 600x Activity Surge
  • The Rise of the Malicious App
  • China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei Servers
  • Cyber Group ‘Gold Melody’ Selling Compromised Access to Ransomware Attackers

Copyright © TheCyberSecurity.News, All Rights Reserved.