Connect with us

Hi, what are you looking for?

HEADLINES

Sophos uncovers Gootloader’s SEO manipulation, hacked website campaign that targets business users

Gootloader uses SEO optimization and social engineering, a combination that is not commonly seen in malware delivery. The usually recommended safety instructions to overcome common threats are not sufficient here. Organizations need to understand how this type of attack works, as outlined in the Sophos research, to be able to recognize it and be ready and able to defend against it.

Sophos, a global leader in next-generation cybersecurity, published research earlier this year on how the operators behind the “Gootloader” malware delivery platform were poisoning websites with malicious content and manipulating search engine optimization (SEO) to ensure that these hacked websites appeared among the top search results.

Recently, Sophos researchers have now published an update to the Gootloader research that reveals the following: 

  • The operators behind Gootloader ensure that a web search will find and accept the compromised sites as one of the most suitable targets.
  • This is no rudimentary process, as the search results that deliver Gootloader pages are often the top result for the specific query that leads victims to them.
  • The malicious code that runs on the compromised websites
  • The “mothership” server that controls the infection process and provides the content that is delivered by the compromised sites
  • The most frequently poisoned search terms that reveal Gootloader is targeting corporate internet users rather than consumers

Gabor Szappanos, threat research director at Sophos, said: “Gootloader uses SEO optimization and social engineering, a combination that is not commonly seen in malware delivery. The usually recommended safety instructions to overcome common threats are not sufficient here. Organizations need to understand how this type of attack works, as outlined in the Sophos research, to be able to recognize it and be ready and able to defend against it.”

Sophos recommends that individual internet users also look out for the following warning signs:

  • Search results that point to websites for businesses that have no logical connection to the advice they appear to offer
  • Advice that precisely matches the search terms used in the initial question
  • A ‘message board’-style page that features text and a download link that also precisely matches the search terms used in the initial Google search

Sophos Intercept X protects users by detecting the actions and behaviors of malware like Gootloader, such as the delivery of Cobalt Strike or the use of its process hollowing techniques to inject malware onto a running system.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The all-cash transaction values Secureworks at approximately $859 million. With the completion of the acquisition, Secureworks’ common stock has ceased trading on Nasdaq. Sophos...

HEADLINES

Data privacy is more critical than ever, especially when social media platforms, AI chatbots and connected devices have increased publicly available digital footprints. This...

HEADLINES

Acting on reports about a suspicious message urging customers to click a malicious link to redeem ‘Smart points’, the telco quickly sprang into action...

HEADLINES

Likening the Converge network to a digital fortress, CISO Andrew T.  Malijan said that its battlements were strengthened in 2024 as it blocked a...

HEADLINES

ThinkShield Firmware Assurance is one of the only computer OEM solutions to enable deep visibility and protection below the operating system (OS) by embracing Zero...

HEADLINES

Kaspersky experts have uncovered a series of scams related to the growing demand, ranging from impersonating trusted brands to creating entirely fraudulent storefronts.

HEADLINES

This achievement highlights the increasing demand for Sophos’ proactive, expert-led security solutions, which help organizations of all sizes stay protected 24/7 against increasingly sophisticated...

HEADLINES

Trend's 2025 predictions report warns of the potential for malicious "digital twins," where breached/leaked personal information (PII) is used to train an LLM to...

Advertisement