Connect with us

Hi, what are you looking for?

HEADLINES

Sophos uncovers Gootloader’s SEO manipulation, hacked website campaign that targets business users

Gootloader uses SEO optimization and social engineering, a combination that is not commonly seen in malware delivery. The usually recommended safety instructions to overcome common threats are not sufficient here. Organizations need to understand how this type of attack works, as outlined in the Sophos research, to be able to recognize it and be ready and able to defend against it.

Sophos, a global leader in next-generation cybersecurity, published research earlier this year on how the operators behind the “Gootloader” malware delivery platform were poisoning websites with malicious content and manipulating search engine optimization (SEO) to ensure that these hacked websites appeared among the top search results.

Recently, Sophos researchers have now published an update to the Gootloader research that reveals the following: 

  • The operators behind Gootloader ensure that a web search will find and accept the compromised sites as one of the most suitable targets.
  • This is no rudimentary process, as the search results that deliver Gootloader pages are often the top result for the specific query that leads victims to them.
  • The malicious code that runs on the compromised websites
  • The “mothership” server that controls the infection process and provides the content that is delivered by the compromised sites
  • The most frequently poisoned search terms that reveal Gootloader is targeting corporate internet users rather than consumers

Gabor Szappanos, threat research director at Sophos, said: “Gootloader uses SEO optimization and social engineering, a combination that is not commonly seen in malware delivery. The usually recommended safety instructions to overcome common threats are not sufficient here. Organizations need to understand how this type of attack works, as outlined in the Sophos research, to be able to recognize it and be ready and able to defend against it.”

Sophos recommends that individual internet users also look out for the following warning signs:

  • Search results that point to websites for businesses that have no logical connection to the advice they appear to offer
  • Advice that precisely matches the search terms used in the initial question
  • A ‘message board’-style page that features text and a download link that also precisely matches the search terms used in the initial Google search

Sophos Intercept X protects users by detecting the actions and behaviors of malware like Gootloader, such as the delivery of Cobalt Strike or the use of its process hollowing techniques to inject malware onto a running system.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

White Papers

This demonstrates that despite a slight improvement from last year, cybersecurity preparedness remains low as hyperconnectivity and AI introduce new complexities for security practitioners.

HEADLINES

The Fraud Bureau is a collaborative initiative that unites banks, fintechs, and financial institutions to share data on potentially deceptive applicant activity securely. This...

HEADLINES

Amplifying this risk is the increasing use of artificial intelligence (AI), which introduces new levels of realism and precision that demand heightened vigilance, especially...

HEADLINES

#BeCyberSmart is the PLDT Group’s umbrella campaign for cybersecurity awareness aimed at promoting vigilance against scams, digital hygiene and responsible online behavior, especially among...

HEADLINES

According to a new report from Kaspersky GReAT (Global Research and Analysis Team), the attackers targeted at least six organizations across the software, IT,...

White Papers

Among the primary risks are inadequate security measures and insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT...

HEADLINES

The campaigns show attackers are capitalizing on people’s increasing familiarity with completing multiple authentication steps online – a trend HP calls ‘click tolerance’. 

White Papers

IBM X-Force observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied heavily on...

Advertisement