Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Affordable Luxury: Decadent Tech Must-Haves Everyone Secretly Wants

    How to Fix a YouTube Black Screen

    Wi-Fi Grayed Out on Your iPhone? Here’s How to Get It Back

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      The HDD brand that brought you the 1.8-inch, 2.5-inch, and 3.5-inch hard drives is now back with a $19 pocket-sized personal cloud for your smartphones

      February 12, 2026

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025
    • Crypto

      Wall Street Moves Into Prediction Markets With Election-Contract ETF Filings

      February 18, 2026

      Tectonic to Host Inaugural Quantum Summit at ETHDenver 2026 Focused on Post-Quantum Cryptography Readiness for Web3

      February 18, 2026

      Ki Young Ju Says Bitcoin May Need to Hit $55K Before True Recovery Begins

      February 18, 2026

      MYX Finance Is Oversold For The First Time Ever, Yet No Relief In Sight

      February 18, 2026

      Everyone is Talking about the SaaSpocalypse, But Why Does it matter for Crypto?

      February 18, 2026
    • Technology

      Affordable Luxury: Decadent Tech Must-Haves Everyone Secretly Wants

      February 19, 2026

      How to Fix a YouTube Black Screen

      February 19, 2026

      Wi-Fi Grayed Out on Your iPhone? Here’s How to Get It Back

      February 19, 2026

      This Asus Portable Monitor Is Not Your Average Second Screen and It’s 20% Off

      February 19, 2026

      Before You Buy a Wi-Fi Extender, Try This

      February 19, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Gootloader malware is back with new tricks after 7-month break
    Technology

    Gootloader malware is back with new tricks after 7-month break

    TechAiVerseBy TechAiVerseNovember 6, 2025No Comments5 Mins Read3 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Gootloader malware is back with new tricks after 7-month break
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Gootloader malware is back with new tricks after 7-month break

    The Gootloader malware loader operation has returned after a 7-month absence and is once again performing SEO poisoning to promote fake websites that distribute the malware.

    Gootloader is a JavaScript-based malware loader spread through compromised or attacker-controlled websites, used to trick users into downloading malicious documents.

    The websites are promoted in search engines either via ads or through search engine optimization (SEO) poisoning, which ranks a website higher in the results for a particular keyword, like legal documents and agreements.

    Malicious ad for an NDA template
    Source: Gootloader researcher

    In the past, these websites would display fake message boards that pretended to discuss users’ query, with some posts recommending (malicious) document templates that could be downloaded. The SEO campaigns later switched to using websites that pretend to offer free templates for various legal documents.

    Fake agreement and legal document template site
    Source: Gootloader researcher

    When a visitor clicked the “Get Document” button, the site checked if they were a legitimate user and, if so, downloaded an archive containing a malicious document with a .js extension. For example, the archive could include a file named mutual_non_disclosure_agreement.js.

    Gootloader would execute when launching the document and downloaded additional malware payloads onto the device, including Cobalt Strike, backdoors, and bots that provided initial access to corporate networks. Other threat actors then used this access to deploy ransomware or conduct other attacks.

    Gootloader returns

    A cybersecurity researcher operating under the pseudonym “Gootloader” has been tracking and actively disrupting the malware operation for years by filing abuse reports with ISPs and hosting platforms to take down attacker-controlled infrastructure.

    The researcher told BleepingComputer that his activities led to the Gootloader operation suddenly ceasing on March 31st, 2025.

    The researcher and Anna Pham of Huntress Labs now report that Gootloader has returned in a new campaign that once again impersonates legal documents.

    “In this latest campaign, we’ve observed thousands of unique keywords spread over 100 websites,” reads a new blog post by the Gootloader researcher. “The ultimate goal remains the same: convince victims to download a malicious ZIP archive containing a JScript (.JS) file that establishes initial access for follow-on activity — usually leading to ransomware deployment.”

    Current attack flow of Gootloader campaign
    Source: Huntress Labs

    However, the researchers say this new variant uses a few techniques to evade automated analysis tools and security researchers.

    Huntress found that the JavaScript added to malicious websites hides the real filenames by using a special web font that replaces letters with look-alike symbols.

    In the HTML source, you see nonsense text, but when the page is rendered, the font’s swapped glyph shapes display normal words, making it harder for security software and researchers to find keywords like “invoice” or “contract” in the source code.

    “Rather than using OpenType substitution features or character mapping tables, the loader swaps what each glyph actually displays. The font’s metadata appears completely legitimate—the character “O” maps to a glyph named “O”, the character “a” maps to a glyph named “a”, and so forth,” explains Huntress.

    “However, the actual vector paths that define these glyphs have been swapped. When the browser requests the shape for glyph “O”, the font provides the vector coordinates that draw the letter “F” instead. Similarly, “a” draws “l”, “9” draws “o”, and special Unicode characters like “±” draw “i”. The gibberish string Oa9Z±h• in the source code renders as “Florida” on screen.”

    Using a character mapping table to display readable text to visitors
    Source: Huntress Labs

    Researchers from the DFIR Report also discovered that Gootloader is using malformed Zip archives to distribute Gootloader scripts from attacker-controlled websites.

    These archives are crafted so that when the downloaded ZIP file is extracted with Windows Explorer, the malicious JavaScript file, Review_Hearings_Manual_2025.js, is extracted.

    However, that same archive, when extracted within VirusTotal, Python’s zip utilities, or 7-Zip, will unpack a harmless text file named Review_Hearings_Manual_202.txt.

    As you can see in the image below of 010 Editor, the archive contains both files but is malformed, causing it to be extracted differently depending on the tool used.

    Gootloader archive using a malformed archive
    Source: BleepingComputer

    It’s unclear whether this is the same concatenation trick described in 2024 or if they are using a new technique to get Windows to extract the JS file.

    Finally, the campaign is dropping the Supper SOCKS5 backdoor on devices, which is used to gain remote access to the network.

    The Supper backdoor is malware that provides remote access to infected devices and is known to be used by a ransomware affiliate tracked as Vanilla Tempest.

    This threat actor has a long history of conducting ransomware attacks and is believed to have been an affiliate of Inc, BlackCat, Quantum Locker, Zeppelin, and Rhysida.

    In the attacks observed by Huntress, the threat actor moved fast once a device was infected, performing reconnaissance within 20 minutes and ultimately compromising the Domain Controller within 17 hours.

    With Gootloader now back in operation, consumers and corporate users need to be careful about searching for and downloading legal agreements and templates from the web.

    Unless the website is known for offering these types of templates, it should be treated with suspicion and avoided.


    Secrets Security Cheat Sheet: From Sprawl to Control

    Whether you’re cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

    Get the cheat sheet and take the guesswork out of secrets management.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleHyundai AutoEver America data breach exposes SSNs, drivers licenses
    Next Article From vibe coding to context engineering: 2025 in software development
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Affordable Luxury: Decadent Tech Must-Haves Everyone Secretly Wants

    February 19, 2026

    How to Fix a YouTube Black Screen

    February 19, 2026

    Wi-Fi Grayed Out on Your iPhone? Here’s How to Get It Back

    February 19, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025684 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025272 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025156 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025117 Views
    Don't Miss
    Technology February 19, 2026

    Affordable Luxury: Decadent Tech Must-Haves Everyone Secretly Wants

    Affordable Luxury: Decadent Tech Must-Haves Everyone Secretly Wants If you are a reader experiencing an…

    How to Fix a YouTube Black Screen

    Wi-Fi Grayed Out on Your iPhone? Here’s How to Get It Back

    This Asus Portable Monitor Is Not Your Average Second Screen and It’s 20% Off

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Affordable Luxury: Decadent Tech Must-Haves Everyone Secretly Wants

    February 19, 20262 Views

    How to Fix a YouTube Black Screen

    February 19, 20261 Views

    Wi-Fi Grayed Out on Your iPhone? Here’s How to Get It Back

    February 19, 20262 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.