×
Tuesday, November 26, 2024

Gootkit Malware Continues to Evolve with New Components and ... - The Hacker News

Last updated Sunday, January 29, 2023 01:05 ET , Source: NewsService

The threat actors associated with the Gootkit malware have made "notable changes" to their toolset, adding new components and obfuscations to their infection chains.

Google-owned Mandiant is monitoring the activity cluster under the moniker UNC2565, noting that the usage of the malware is "exclusive to this group."

Gootkit, also called Gootloader, is spread through compromised websites that victims are tricked into visiting when searching for business-related documents like agreements and contracts via a technique called search engine optimization (SEO) poisoning.

The purported documents take the form of ZIP archives that harbor the JavaScript malware, which, when launched, paves the way for additional payloads such as Cobalt Strike Beacon, FONELAUNCH, and SNOWCONE.

FONELAUNCH is a .NET-based loader designed to load an encoded payload into memory, and SNOWCONE is a downloader that's tasked with retrieving next-stage payloads, typically IcedID, via HTTP.

While the overarching goals of Gootkit have remained unchanged, the attack sequence in itself has received significant updates, wherein the JavaScript file within the ZIP archive is trojanized and contains another obfuscated JavaScript file that consequently proceeds to execute the malware.

The new variant, which was spotted by the threat intelligence firm in November 2022, is being tracked as GOOTLOADER.POWERSHELL. It's worth noting that the revamped infection chain was also documented by Trend Micro earlier this month,...



Read Full Story: https://news.google.com/__i/rss/rd/articles/CBMiSmh0dHBzOi8vdGhlaGFja2VybmV3cy5jb20vMjAyMy8wMS9nb290a2l0LW1hbHdhcmUtY29udGludWVzLXRvLWV2b2x2ZS5odG1s0gEA?oc=5

Your content is great. However, if any of the content contained herein violates any rights of yours, including those of copyright, please contact us immediately by e-mail at media[@]kissrpr.com.