• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
gootloader malware still active, deploys new versions for enhanced attacks

GootLoader Malware Still Active, Deploys New Versions for Enhanced Attacks

You are here: Home / General Cyber Security News / GootLoader Malware Still Active, Deploys New Versions for Enhanced Attacks
July 5, 2024

The malware acknowledged as GootLoader continues to be in energetic use by threat actors hunting to supply extra payloads to compromised hosts.

“Updates to the GootLoader payload have resulted in several versions of GootLoader, with GootLoader 3 at this time in energetic use,” cybersecurity agency Cybereason stated in an analysis revealed very last 7 days.

“When some of the particulars of GootLoader payloads have improved more than time, an infection techniques and total performance continue to be comparable to the malware’s resurgence in 2020.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

GootLoader, a malware loader section of the Gootkit banking trojan, is connected to a danger actor named Hive0127 (aka UNC2565). It abuses JavaScript to down load post-exploitation equipment and is distributed via research engine optimization (Seo) poisoning methods.

It commonly serves as a conduit for offering many payloads such as Cobalt Strike, Gootkit, IcedID, Kronos, REvil, and SystemBC.

GootLoader Malware

In new months, the risk actors powering GootLoader have also unleashed their individual command-and-handle (C2) and lateral motion software dubbed GootBot, indicating that the “team is expanding their market place to achieve a broader viewers for their financial gains.”

Attack chains include compromising web-sites to host the GootLoader JavaScript payload by passing it off as legal files and agreements, which, when released, sets up persistence applying a scheduled endeavor and executes supplemental JavaScript to kick-start off a PowerShell script for amassing procedure facts and awaiting further more recommendations.

Cybersecurity

“Internet sites that host these archive files leverage Look for Motor Optimization (Search engine optimization) poisoning techniques to lure in victims that are seeking for enterprise-similar information these as agreement templates or legal files,” security scientists Ralph Villanueva, Kotaro Ogino, and Gal Romano reported.

The attacks are also noteworthy for earning use of source code encoding, management stream obfuscation, and payload measurement inflation in get to resist investigation and detection. Another method involves embedding the malware in legit JavaScript library files like jQuery, Lodash, Maplace.js, and tui-chart.

“GootLoader has acquired many updates for the duration of its existence cycle, together with changes to evasion and execution functionalities,” the researchers concluded.

Found this report fascinating? Adhere to us on Twitter  and LinkedIn to read through more distinctive articles we submit.


Some elements of this report are sourced from:
thehackernews.com

Previous Post: «polyfill[.]io attack impacts over 380,000 hosts, including major companies Polyfill[.]io Attack Impacts Over 380,000 Hosts, Including Major Companies
Next Post: Blueprint for Success: Implementing a CTEM Operation blueprint for success: implementing a ctem operation»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.