Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

Benchmark raises $225 million in special funding to double Cerebras

AI startup founder says he plans a ‘March for Billionaires’ to protest California’s wealth tax

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » GootLoader is back, uses new font tricks to hide malware on WordPress sites
Identity

GootLoader is back, uses new font tricks to hide malware on WordPress sites

userBy userNovember 11, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 11, 2025Ravi LakshmananMalware/Network Security

According to new research from Huntress, the malware known as GootLoader has reemerged after a brief spike in activity in early March of this year.

The cybersecurity firm announced that it has observed three GootLoader infections since October 27, 2025, two of which resulted in manual keyboard intrusion, and a domain controller compromise that occurred within 17 hours of the initial infection.

“GootLoader is back, leveraging custom WOFF2 fonts with glyph substitution to obfuscate filenames,” security researcher Anna Pham said, adding that the malware “exploits WordPress comment endpoints to deliver XOR-encrypted ZIP payloads with unique keys for each file.”

GootLoader, which belongs to the threat actor tracked as Hive0127 (also known as UNC2565), is a JavaScript-based malware loader that is often distributed via search engine optimization (SEO) poisoning tactics that deliver additional payloads such as ransomware.

DFIR retainer service

In a report published last September, Microsoft revealed that a threat actor called Vanilla Tempest was handed off from a GootLoader infection by Storm-0494 and used that access to drop a backdoor called Supper (also known as SocksShell or ZAPCAT) and AnyDesk for remote access. These attack chains led to the deployment of INC ransomware.

It is worth noting that Supper is also grouped with Interlock RAT (also known as NodeSnake), another malware primarily related to Interlock ransomware. “Although there is no direct evidence that Interlock used Supper, Interlock and Vice Society have each had ties to Ricida at different times, suggesting potential overlap in the broader cybercriminal ecosystem,” Foresekout noted last month.

And earlier this year, it was discovered that the attackers behind GootLoader used Google Ads to target victims searching for legal templates such as contracts on the search engine, redirecting them to compromised WordPress sites hosting malware-laced ZIP archives.

The latest attack sequence documented by Huntress shows that searches on Bing for terms such as “missouri coverutilityeasement roadway” are used to trick unsuspecting users into delivering ZIP archives. Of note here is the use of custom web fonts to obfuscate file names displayed in the browser in order to defeat static analysis techniques.

“So when a user tries to copy a filename or inspect the source code, they end up seeing strange characters like ‛›μI€vSO₽*’Oaμ==€ã‚33O%33ã€×:O[TM€v3cwv”Phamexplained[TM€v3cwv”Phamexplained[TM€v3cwv」のような奇妙な文字が表示されることになります」とファム氏は説明した。[TM€v3cwv”Phamexplained

“However, when rendered in a victim’s browser, these same characters are magically transformed into perfectly readable text like Florida_HOA_Committee_Meeting_Guide.pdf. This is achieved through a custom WOFF2 font file that Gootloader embeds directly into the page’s JavaScript code using Z85 encoding. Z85 encoding compresses 32KB of fonts into 40K of Base85 It is a variant of

We’ve also seen new techniques that modify ZIP files so that they unzip as harmless-looking .TXT files when opened with tools like VirusTotal, Python’s ZIP utility, and 7-Zip. In Windows File Explorer, the archive extracts the desired payload, a valid JavaScript file.

CIS build kit

“This simple evasion technique buys the attacker time by hiding the true nature of the payload from automated analysis,” a security researcher who has been tracking the malware for years under the pseudonym “GootLoader” said of the evolution.

The JavaScript payload present within the archive is designed to deploy Supper, a backdoor capable of remote control and SOCKS5 proxying. In at least one instance, the attacker allegedly used Windows Remote Management (WinRM) to move laterally to a domain controller and create a new user with administrator-level access.

“The Supper SOCKS5 backdoor uses tedious obfuscation to protect simple functionality. API hammering, runtime shellcode construction, and custom encryption add headaches to analysis, but the core functionality, SOCKS proxying and remote shell access, remains intentionally basic,” Huntress said.

“This ‘good enough’ approach proves that attackers do not need state-of-the-art exploits when properly obfuscated basic tools accomplish their goals.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleStudy reveals Japan’s prehistoric Jomon people had ‘little or no’ DNA from mysterious Denisovans
Next Article Newly discovered toad skips the tadpole stage and gives birth to live ‘toads’
user
  • Website

Related Posts

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

February 7, 2026

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

February 6, 2026

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

Benchmark raises $225 million in special funding to double Cerebras

AI startup founder says he plans a ‘March for Billionaires’ to protest California’s wealth tax

From Svedka to Anthropic, brands are boldly leveraging AI in their Super Bowl ads

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.