Gootloader Aims Malicious, Custom Bot Army at Enterprise Networks

  /     /     /  
Publicated : 23/11/2024   Category : security


Gootloader Aims Malicious, Custom Bot Army at Enterprise Networks


Previously limited to initial access brokering, the Gootloader group has pivoted to a nasty post-compromise GootBot attack, each implant with its own C2.



The Gootloader Group, previously known only as an initial access broker (IAB) and malware operator, has unleashed a destructive new post-compromise tool, GootBot, which spreads bots throughout enterprise environments following a compromise.
Gootloader
(also tracked under Hive0127 and UNC2565) has been active since 2014 and uses
SEO poisoning
to fool victims into downloading infected business document templates — contracts and forms — for initial compromise, researchers at IBM X-Force threat intelligence group said in a new advisory.
Typically, Gootloader would then broker that access off to other threat groups who would use tools like CobaltStrike or Remote Desktop Protocl (RDP) to spread throughout the network, the researchers explained. But a new tool the group has begun deploying is the much more destructive GootBot post-compromise malware, which, after Gootloaders initial compromise, deploys a very difficult to detect bot army.
The IBM X-Force group explained, alarmingly, each bot is controlled by its own command-and-control server (C2) running on a breached WordPress site. Once deployed, the bots begin searching out a domain controller.
Worse yet, GootBot, as of Nov. 6, has no detections listed on VirusTotal, the researchers added.
This shift in TTPs and tooling heightens the risk of successful post-exploitation stages, such as Gootloader-linked ransomware affiliate activity, the report warned.

Last News

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Gootloader Aims Malicious, Custom Bot Army at Enterprise Networks