Gootloader Malware Platform Uses Sophisticated Techniques to Deliver Malware

NJCCIC Alert

Original Release Date: 3/4/2021

Summary

Gootloader, the multi-payload malware platform, is actively targeting entities in the US, Germany, and South Korea. The infection chain begins with social engineering techniques that include manipulated search engine optimization (SEO), which brings malicious websites to the top of the results on search engine websites. This fraudulent forum website includes a link that, when clicked, initiates the download of a JavaScript file and then begins the next stages of the attack. Using fileless techniques, the malicious activity can remain undetected by the user and allow the download of additional malware, including the Kronos malware, Cobalt Strike exploitation tool, the Gootkit trojan, or Sodinokibi ransomware.

Recommendations

The NJCCIC recommends users run a security solution on their devices that can detect suspicious activity in memory and protects against fileless malware. Windows users can also turn off the “Hide Extensions for Known File Types” view setting in the Windows file explorer. Additionally, users are encouraged to verify websites prior to visiting them and refrain from downloading files or programs from untrusted or unofficial websites. For more information on the Gootloader platform and indicators of compromise, review the Sophos article and Help Net Security article.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.