Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Softbank’s sale of NVIDIA causes market confusion and questions arise

WhatsApp malware ‘Maverick’ hijacks browser sessions and targets Brazil’s largest banks

Immortal startup Eternos wins $10.3 million as it pivots to personal AI that sounds like you

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » GootLoader is back, uses new font tricks to hide malware on WordPress sites
Identity

GootLoader is back, uses new font tricks to hide malware on WordPress sites

userBy userNovember 11, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 11, 2025Ravi LakshmananMalware/Network Security

According to new research from Huntress, the malware known as GootLoader has reemerged after a brief spike in activity in early March of this year.

The cybersecurity firm announced that it has observed three GootLoader infections since October 27, 2025, two of which resulted in manual keyboard intrusion, and a domain controller compromise that occurred within 17 hours of the initial infection.

“GootLoader is back, leveraging custom WOFF2 fonts with glyph substitution to obfuscate filenames,” security researcher Anna Pham said, adding that the malware “exploits WordPress comment endpoints to deliver XOR-encrypted ZIP payloads with unique keys for each file.”

GootLoader, which belongs to the threat actor tracked as Hive0127 (also known as UNC2565), is a JavaScript-based malware loader that is often distributed via search engine optimization (SEO) poisoning tactics that deliver additional payloads such as ransomware.

DFIR retainer service

In a report published last September, Microsoft revealed that a threat actor called Vanilla Tempest was handed off from a GootLoader infection by Storm-0494 and used that access to drop a backdoor called Supper (also known as SocksShell or ZAPCAT) and AnyDesk for remote access. These attack chains led to the deployment of INC ransomware.

It is worth noting that Supper is also grouped with Interlock RAT (also known as NodeSnake), another malware primarily related to Interlock ransomware. “Although there is no direct evidence that Interlock used Supper, Interlock and Vice Society have each had ties to Ricida at different times, suggesting potential overlap in the broader cybercriminal ecosystem,” Foresekout noted last month.

And earlier this year, it was discovered that the attackers behind GootLoader used Google Ads to target victims searching for legal templates such as contracts on the search engine, redirecting them to compromised WordPress sites hosting malware-laced ZIP archives.

The latest attack sequence documented by Huntress shows that searches on Bing for terms such as “missouri coverutilityeasement roadway” are used to trick unsuspecting users into delivering ZIP archives. Of note here is the use of custom web fonts to obfuscate file names displayed in the browser in order to defeat static analysis techniques.

“So when a user tries to copy a filename or inspect the source code, they end up seeing strange characters like ‛›μI€vSO₽*’Oaμ==€ã‚33O%33ã€×:O[TM€v3cwv”Phamexplained[TM€v3cwv”Phamexplained[TM€v3cwv」のような奇妙な文字が表示されることになります」とファム氏は説明した。[TM€v3cwv”Phamexplained

“However, when rendered in a victim’s browser, these same characters are magically transformed into perfectly readable text like Florida_HOA_Committee_Meeting_Guide.pdf. This is achieved through a custom WOFF2 font file that Gootloader embeds directly into the page’s JavaScript code using Z85 encoding. Z85 encoding compresses 32KB of fonts into 40K of Base85 It is a variant of

We’ve also seen new techniques that modify ZIP files so that they unzip as harmless-looking .TXT files when opened with tools like VirusTotal, Python’s ZIP utility, and 7-Zip. In Windows File Explorer, the archive extracts the desired payload, a valid JavaScript file.

CIS build kit

“This simple evasion technique buys the attacker time by hiding the true nature of the payload from automated analysis,” a security researcher who has been tracking the malware for years under the pseudonym “GootLoader” said of the evolution.

The JavaScript payload present within the archive is designed to deploy Supper, a backdoor capable of remote control and SOCKS5 proxying. In at least one instance, the attacker allegedly used Windows Remote Management (WinRM) to move laterally to a domain controller and create a new user with administrator-level access.

“The Supper SOCKS5 backdoor uses tedious obfuscation to protect simple functionality. API hammering, runtime shellcode construction, and custom encryption add headaches to analysis, but the core functionality, SOCKS proxying and remote shell access, remains intentionally basic,” Huntress said.

“This ‘good enough’ approach proves that attackers do not need state-of-the-art exploits when properly obfuscated basic tools accomplish their goals.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSwitzerland joins major research program with Horizon Europe
Next Article Immortal startup Eternos wins $10.3 million as it pivots to personal AI that sounds like you
user
  • Website

Related Posts

WhatsApp malware ‘Maverick’ hijacks browser sessions and targets Brazil’s largest banks

November 11, 2025

CISO’s expert guide to AI supply chain attacks

November 11, 2025

Researchers detect malicious npm package targeting GitHub-owned repositories

November 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Softbank’s sale of NVIDIA causes market confusion and questions arise

WhatsApp malware ‘Maverick’ hijacks browser sessions and targets Brazil’s largest banks

Immortal startup Eternos wins $10.3 million as it pivots to personal AI that sounds like you

GootLoader is back, uses new font tricks to hide malware on WordPress sites

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.