Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

UK hydrogen industry poised for expansion, but policy slows momentum

Exploring the closed nuclear fuel cycle: From recycling to fuel

Unmasking new TOAD attacks hidden in legitimate infrastructure

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » GootLoader malware uses 500 to 1,000 concatenated ZIP archives to evade detection
Identity

GootLoader malware uses 500 to 1,000 concatenated ZIP archives to evade detection

userBy userJanuary 16, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

January 16, 2026Ravi LakshmananMalvertising/Threat Intelligence

A JavaScript (also known as JScript) malware loader called GootLoader has been observed using malicious ZIP archives designed to evade detection efforts by concatenating 500 to 1,000 archives.

“Adversaries are creating fraudulent archives as an anti-analysis technique,” Aaron Walton, a security researcher at Expel, said in a report shared with Hacker News. “In short, while many decompression tools consistently fail to extract files, one important decompression tool seems to work consistently and reliably: the default tool built into Windows systems.”

This prevents tools such as WinRAR and 7-Zip from processing the archive, and many automated workflows from analyzing the file contents. At the same time, it can be opened with the default Windows unarchive, allowing victims of social engineering schemes to extract and run JavaScript malware.

GootLoader is typically distributed via search engine optimization (SEO) poisoning tactics and malvertising, targeting users looking for legitimate templates and redirecting them to compromised WordPress sites that host malicious ZIP archives. Like other loaders, it is designed to deliver secondary payloads, including ransomware. This malware has been detected in the wild since at least 2020.

cyber security

In late October 2025, malware campaigns propagating malware resurfaced with new techniques. It leverages a custom WOFF2 font with glyph substitution to obfuscate filenames and exploits the WordPress comments endpoint (‘/wp-comments-post.php’) to deliver a ZIP payload when a user clicks the site’s ‘Download’ button.

Expel’s latest findings highlight the continued evolution of delivery methods, with attackers employing more sophisticated obfuscation mechanisms to evade detection.

Concatenates 500 to 1,000 archives to create a malicious ZIP file Truncates the archive’s End of Central Directory (EOCD) record, missing two critical bytes from the expected structure, causing parsing errors Randomizes the values ​​of non-critical fields such as disk number and number of disks, causing unzipping tools to expect a series of ZIP archives where none exists

“Concatenating a random number of files and filling certain fields with random values ​​is a defense evasion technique called ‘hashbusting,'” Walton explained.

“In reality, every user who downloads a ZIP file from GootLoader’s infrastructure will receive a unique ZIP file, so looking for its hash in other environments is futile. GootLoader’s developers use hashbusting for ZIP archives and the JScript files they contain.”

The attack chain essentially involves a ZIP archive being delivered as an XOR encoded BLOB. This blob is decoded and appended repeatedly on the client side (i.e., the victim’s browser) until it reaches a set size, effectively bypassing security controls designed to detect ZIP file submissions.

cyber security

As soon as the downloaded ZIP archive is double-clicked by the victim, Windows’ default unzipping feature opens the ZIP folder containing the JavaScript payload in File Explorer. Launching a JavaScript file triggers its execution via ‘wscript.exe’ from a temporary folder, as the file contents are not explicitly extracted.

The JavaScript malware then creates a Windows Shortcut (LNK) file in the startup folder to establish persistence and finally uses cscript to run a second JavaScript file and generate PowerShell commands to proceed to the next stage of the infection. Previous GootLoader attacks used PowerShell scripts to gather system information and receive commands from remote servers.

To combat the threat posed by GootLoader, organizations are encouraged to consider blocking ‘wscript.exe’ and ‘cscript.exe’ from running downloaded content when not required, and consider using Group Policy Objects (GPOs) to ensure that JavaScript files are opened in Notepad by default rather than being executed via ‘wscript.exe’.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleA hacking campaign targeting prominent Gmail and WhatsApp users across the Middle East
Next Article Trump administration is asking technology companies to buy power plants they may not use for $15 billion
user
  • Website

Related Posts

Unmasking new TOAD attacks hidden in legitimate infrastructure

January 28, 2026

Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected

January 28, 2026

WhatsApp deploys lockdown-style security mode to protect targeted users from spyware

January 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

UK hydrogen industry poised for expansion, but policy slows momentum

Exploring the closed nuclear fuel cycle: From recycling to fuel

Unmasking new TOAD attacks hidden in legitimate infrastructure

Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.