Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
GootLoader Malware Strikes WordPress Sites Using Deceptive Font Hack
Advertisements

GootLoader Leverages SEO Poisoning on WordPress

A sophisticated malware campaign involving the GootLoader payload is actively compromising WordPress websites. Cybersecurity researchers at Sucuri identified the campaign, which uses search engine optimization (SEO) poisoning to lure victims. Attackers hack into legitimate WordPress sites and populate them with fake blog posts designed to appear as discussion forums. These posts are optimized to rank highly in search engine results for specific queries related to business documents and agreements.

When a user searches for these terms and clicks on one of the malicious links, they are directed to a compromised page. This page serves as the initial stage of the attack, designed to trick the visitor into downloading the malware.

The ‘Font Pack’ Ruse Delivers Malicious Payload

Upon landing on the compromised page, the visitor is met with a deceptive user interface. The content appears garbled, and a fake pop-up message is displayed. This message informs the user that the site’s font is not rendering correctly and instructs them to download a “WordPress Font Pack” to fix the display issue. The download link provides a ZIP archive containing a malicious JavaScript (.js) file.

If the user extracts and executes the JavaScript file, the GootLoader malware is installed on their computer. GootLoader is a first-stage malware downloader, which means its primary function is to establish a foothold on the infected system and then download more dangerous secondary payloads, such as ransomware or banking trojans. Sucuri’s analysis revealed the GootLoader code was injected into over 1,480 files on compromised sites, often obfuscated within legitimate-looking PHP files.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading