Gootloader Aims Malicious, Custom Bot Army at Enterprise Networks

  /     /     /  
Publicated : 23/11/2024   Category : security


Gootloader Aims Malicious, Custom Bot Army at Enterprise Networks


Previously limited to initial access brokering, the Gootloader group has pivoted to a nasty post-compromise GootBot attack, each implant with its own C2.



The Gootloader Group, previously known only as an initial access broker (IAB) and malware operator, has unleashed a destructive new post-compromise tool, GootBot, which spreads bots throughout enterprise environments following a compromise.
Gootloader
(also tracked under Hive0127 and UNC2565) has been active since 2014 and uses
SEO poisoning
to fool victims into downloading infected business document templates — contracts and forms — for initial compromise, researchers at IBM X-Force threat intelligence group said in a new advisory.
Typically, Gootloader would then broker that access off to other threat groups who would use tools like CobaltStrike or Remote Desktop Protocl (RDP) to spread throughout the network, the researchers explained. But a new tool the group has begun deploying is the much more destructive GootBot post-compromise malware, which, after Gootloaders initial compromise, deploys a very difficult to detect bot army.
The IBM X-Force group explained, alarmingly, each bot is controlled by its own command-and-control server (C2) running on a breached WordPress site. Once deployed, the bots begin searching out a domain controller.
Worse yet, GootBot, as of Nov. 6, has no detections listed on VirusTotal, the researchers added.
This shift in TTPs and tooling heightens the risk of successful post-exploitation stages, such as Gootloader-linked ransomware affiliate activity, the report warned.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Gootloader Aims Malicious, Custom Bot Army at Enterprise Networks