In an unusually particular marketing campaign, customers looking concerning the legality of Bengal Cats in Australia are being focused with the GootLoader malware.
“On this case, we discovered the GootLoader actors utilizing search outcomes for details about a selected cat and a selected geography getting used to ship the payload: ‘Are Bengal Cats authorized in Australia?,'” Sophos researchers Trang Tang, Hikaru Koike, Asha Fort, and Sean Gallagher stated in a report revealed final week.
GootLoader, because the title implies, is a malware loader that is usually distributed utilizing SEO (search engine optimisation) poisoning ways for preliminary entry.
Particularly, the malware is deployed onto sufferer machines when looking for sure phrases like authorized paperwork and agreements on search engines like google like Google floor booby-trapped hyperlinks pointing to compromised web sites that host a ZIP archive containing a JavaScript payload.
As soon as put in, it makes approach for a second-stage malware, usually an data stealer and distant entry trojan dubbed GootKit, though it has additionally been noticed delivering different households equivalent to Cobalt Strike, IcedID, Kronos, REvil, and SystemBC up to now for post-exploitation.

The newest assault chain isn’t any totally different in that searches for “Do you want a license to personal a Bengal cat in Australia” floor outcomes that embody a hyperlink to a legitimate-but-infected web site belonging to a Belgium-based LED show maker, from the place victims are prompted to obtain a ZIP archive.
Current throughout the ZIP archive is a JavaScript file that is then chargeable for kicking off a multi-stage assault chain that culminates within the execution of a PowerShell script able to harvesting system data and fetching extra payloads. It is value noting that an similar marketing campaign was documented by Cybereason earlier this July.
Sophos stated it didn’t observe the deployment of GootKit within the case the corporate analyzed, thereby stopping the obtain of extra malware.
“GootLoader is considered one of quite a few persevering with malware-delivery-as-a-service operations that closely leverage search outcomes as a way to achieve victims,” the researchers stated. “Using SEO, and abuse of search engine promoting to lure targets to obtain malware loaders and dropper, will not be new—GootLoader has been doing this since no less than 2020.”
Replace
Google’s Mandiant Managed Protection staff, which is monitoring GootLoader underneath the title SLOWPOUR, stated it additionally found an identical marketing campaign that leverages searches for “california legislation break room necessities” to ship the malware.
“Victims carry out a search, usually for business-related paperwork equivalent to authorized necessities, agreements, or contracts, and navigate to a compromised website with data purportedly associated to their search,” it stated in a technical report revealed late final month.
“Each the archive and the JavaScript file have names that intently resemble the sufferer’s search question. This naming scheme helps trick the consumer into extracting and executing the malware.”
That having stated, there are indications that the assault chains have shifted ways for preliminary entry as of early November 2024. A safety researcher, who goes by the web alias GootLoader, has revealed that the menace actors behind the operation have pivoted from search engine optimisation poisoning ways to pretend PDF converters pushed by way of malvertising campaigns.
“This shift from search engine optimisation poisoning and authorized phrases — clearly geared toward firms — may now goal on a regular basis customers, together with these seeking to convert PDFs to DOCX,” the researcher famous in a quick revealed final week.
(The story was up to date after publication to incorporate new details about the GootLoader campaigns.)