📱 Gootloader exploite des ZIP malformĂ©s qui Ă©chappent Ă  l’analyse mais s’ouvrent sous Windows
📝 Selon un article technique d’Aaron Walton (Threat intel, 15 janv.
📖 cyberveille : https://cyberveille.ch/posts/2026-01-20-gootloader-exploite-des-zip-malformes-qui-echappent-a-lanalyse-mais-souvrent-sous-windows/
🌐 source : https://expel.com/blog/gootloaders-malformed-zip/
#Evasion_de_détection #Gootloader #Cyberveille
Gootloader exploite des ZIP malformĂ©s qui Ă©chappent Ă  l’analyse mais s’ouvrent sous Windows

Selon un article technique d’Aaron Walton (Threat intel, 15 janv. 2026), Gootloader — opĂ©rateur d’« accĂšs initial » historiquement efficace — est rĂ©apparu fin 2025 et collabore Ă  nouveau avec l’acteur Vanilla Tempest (liĂ© Ă  Rhysida). Le billet se concentre sur le premier Ă©tage: un ZIP malformĂ© conçu pour l’anti-analyse et l’évasion. ‱ Le ZIP livrant un fichier JScript est volontairement non conforme: 500 Ă  1 000 archives ZIP concatĂ©nĂ©es, structure « End of Central Directory » tronquĂ©e de 2 octets, et champs non critiques alĂ©atoires (Disk Number, Number of Disks), rendant l’archive illisible pour des outils comme 7-Zip/WinRAR mais parfaitement ouvrable avec l’extracteur natif Windows. Le fichier transmis sur le rĂ©seau est un blob XOR qui est dĂ©codĂ© et auto-apposĂ© cĂŽtĂ© navigateur jusqu’à une taille cible, compliquant la dĂ©tection rĂ©seau et assurant un hashbusting (chaque victime reçoit un fichier unique).

CyberVeille
Ce fichier ZIP presque impossible Ă  analyser cache un #malware bien connu. De retour fin 2025, #Gootloader change de tactique. Le malware s’appuie dĂ©sormais sur une archive ZIP volontairement malformĂ©e pour faire trĂ©bucher les outils d’analyse, sans jamais empĂȘcher l’exĂ©cution du script malveillant qu’elle transporte.
https://www.clubic.com/actualite-595573-ce-fichier-zip-presque-impossible-a-analyser-cache-un-malware-bien-connu.html
Ce fichier ZIP presque impossible Ă  analyser cache un malware bien connu

De retour fin 2025, Gootloader change de tactique. Le malware s’appuie dĂ©sormais sur une archive ZIP volontairement malformĂ©e pour faire trĂ©bucher les outils d’analyse, sans jamais empĂȘcher l’exĂ©cution du script malveillant qu’elle transporte.

clubic.com
Ce fichier ZIP presque impossible Ă  analyser cache un malware bien connu

De retour fin 2025, Gootloader change de tactique. Le malware s’appuie dĂ©sormais sur une archive ZIP volontairement malformĂ©e pour faire trĂ©bucher les outils d’analyse, sans jamais empĂȘcher l’exĂ©cution du script malveillant qu’elle transporte.

clubic.com
Gootloader now uses 1,000-part ZIP archives for stealthy delivery

The Gootloader malware, typically used for initial access, is now using a malformed ZIP archive designed to evade detection by concatenating up to 1,000 archives.

BleepingComputer

Gootloader - ein JavaScript‑basierter Malware‑Loader - ist mit neuen "Tricks" wieder zurĂŒck, berichtet https://gootloader.wordpress.com/2025/11/05/gootloader-is-back-back-again/
Gootloader werde ĂŒber kompromittierte oder vom Angreifer kontrollierte Websites verbreitet verleite Benutzer:innen dazu, Malware - gern als Ransomware - verseuchte Dokumente herunterzuladen.

Die Websites werden in Suchmaschinen entweder ĂŒber Anzeigen oder ĂŒber Suchmaschinenoptimierung (SEO‑Poisoning) beworben, wodurch sie fĂŒr bestimmte SchlĂŒsselwörter wie „rechtliche Dokumente“ und „VertrĂ€ge“ höher im Ergebnis erscheinen.
Also: Vorsicht mit Websites, die rechtliche Dokumente zum Download anbieten.

#infosec #infosecnews #gootloader #malware #Ransomware #BeDiS

Gootloader Is Back (Back Again)

Before I start, I have to give credit, where it’s due. A Major shout-out to RussianPanda and the team at Huntress for catching this new Gootloader campaign in the wild. As the title suggests 


⌛☃❀✔Gootloader Details ✔❀☃⌛

Alright team, it's been a pretty active 24 hours in the cyber realm! We've got a few notable breaches, some clever new malware tactics, critical vulnerabilities from Cisco, and a stark reminder about password hygiene. Let's dive in:

Recent Cyber Attacks and Breaches ⚠

- Hyundai AutoEver America suffered a data breach, with attackers accessing personal information including names, Social Security Numbers, and driver's licenses. The intrusion, discovered on March 1st, had been ongoing since February 22nd.
- Japanese media giant Nikkei also disclosed a breach where malware on an employee's laptop led to stolen Slack credentials, exposing the personal details (names, emails, chat histories) of over 17,000 employees and partners. This highlights the growing risk of collaboration platforms as attack vectors.
- SonicWall confirmed that state-sponsored threat actors were behind their September cloud backup breach, accessing firewall configuration files via an API call. While initially downplayed, it's now clear all customers using the cloud backup service were affected, though SonicWall insists no product, firmware, or source code was impacted.
- Russia's Sandworm (APT44) has been deploying data-wiping malware (like ZeroLot and Sting) against Ukraine's critical grain sector, as well as government, energy, and logistics entities. This marks a strategic shift to target Ukraine's economy, with initial access sometimes facilitated by UAC-0099.
- The State of Nevada government successfully recovered from a ransomware attack in August without paying the ransom, incurring $259,000 in overtime costs and $1.3 million in vendor support. The initial compromise in May stemmed from an employee downloading a trojanised system administration tool via a malicious Google ad, leading to a hidden backdoor and eventual ransomware deployment after backups were deleted.
- An Italian communications executive, Francesco Nicodemo, revealed he was targeted with Paragon's Graphite spyware, making him the fifth known Italian victim in a scandal involving political targeting. WhatsApp had notified 90 individuals globally about evidence of similar targeting.

đŸ€– Bleeping Computer | https://www.bleepingcomputer.com/news/security/hyundai-autoever-america-data-breach-exposes-ssns-drivers-licenses/
đŸ•”đŸŒ The Register | https://go.theregister.com/feed/www.theregister.com/2025/11/06/nikkeis_private_chats_go_public/
📰 The Hacker News | https://thehackernews.com/2025/11/sonicwall-confirms-state-sponsored.html
đŸ•”đŸŒ The Register | https://go.theregister.com/feed/www.theregister.com/2025/11/06/sonicwall_fingers_statebacked_cyber_crew/
đŸ€« CyberScoop | https://cyberscoop.com/sonicwall-customer-portal-nation-state-attack/
đŸ€– Bleeping Computer | https://www.bleepingcomputer.com/news/security/sandworm-hackers-use-data-wipers-to-disrupt-ukraines-grain-sector/
đŸ—žïž The Record | https://therecord.media/russia-sandworm-grain-wipers
đŸ€– Bleeping Computer | https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/
đŸ—žïž The Record | https://therecord.media/nevada-declined-ransom-breach
đŸ—žïž The Record | https://therecord.media/italy-comms-exec-spyware

New Threat Research on Malware and Techniques đŸ›Ąïž

- The Gootloader malware operation has resurfaced after a seven-month hiatus, continuing its SEO poisoning campaigns to distribute malicious JavaScript files disguised as legal documents. New evasion tactics include using special web fonts to obfuscate filenames in HTML source and crafting malformed Zip archives that unpack differently for Windows Explorer versus analysis tools. It's now dropping the Supper SOCKS5 backdoor, linked to ransomware affiliates like Vanilla Tempest, known for rapid network compromise.
- The Russia-aligned threat actor Curly COMrades is using an innovative evasion technique: weaponising Windows Hyper-V to deploy hidden, lightweight Alpine Linux virtual machines. These VMs host custom reverse shells (CurlyShell) and reverse proxies (CurlCat), effectively isolating malware execution and bypassing host-based EDR detections.
- A new Russia-aligned cluster, InedibleOchotense (possibly a Sandworm sub-cluster), is conducting spear-phishing attacks against Ukrainian entities using trojanised ESET installers. These installers drop the Kalambur (SUMBUR) C# backdoor, which uses Tor for C2 and enables OpenSSH/RDP access. Separately, RomCom (Storm-0978) has been weaponising a WinRAR vulnerability (CVE-2025-8088) in Europe and Canada, deploying various backdoors.

đŸ€– Bleeping Computer | https://www.bleepingcomputer.com/news/security/gootloader-malware-is-back-with-new-tricks-after-7-month-break/
📰 The Hacker News | https://thehackernews.com/2025/11/hackers-weaponize-windows-hyper-v-to.html
📰 The Hacker News | https://thehackernews.com/2025/11/trojanized-eset-installers-drop.html

Vulnerabilities and Active Exploitation 🚹

- Cisco has issued patches for two critical vulnerabilities in its Unified Contact Center Express (UCCX) software. CVE-2025-20354 (CVSS 9.8) is an RCE flaw in the Java RMI process, allowing unauthenticated attackers to execute arbitrary commands as root. CVE-2025-20358 (CVSS 9.4) is an authentication bypass, enabling unauthenticated attackers to run scripts as a non-root user. While not yet exploited in the wild, immediate patching (to 12.5 SU3 ES07 or 15.0 ES01) is strongly advised.
- Cisco also warned of a "new attack variant" targeting its ASA and FTD firewalls, exploiting previously patched flaws (CVE-2025-20333 and CVE-2025-20362). These attacks, ongoing for at least six months and linked to the government-backed ArcaneDoor threat crew (UAT4356), now cause devices to continually reload, leading to denial-of-service. Attackers have used zero-days, disabled logging, intercepted CLI commands, intentionally crashed devices, and even modified ROM Monitor for persistence.

đŸ€– Bleeping Computer | https://www.bleepingcomputer.com/news/security/critical-cisco-uccx-flaw-lets-hackers-run-commands-as-root/
đŸ•”đŸŒ The Register | https://go.theregister.com/feed/www.theregister.com/2025/11/06/cisco_firewall_ongoing_attacks/

Threat Landscape Commentary 📉

- A Comparitech report analysing over two billion leaked passwords in 2025 confirms that "123456", "admin", and "password" remain among the most common. A quarter of passwords were number-only, and 38% contained "123". This highlights persistent poor password hygiene, emphasising the need for longer passphrases or, ideally, biometric passkeys.

đŸ•”đŸŒ The Register | https://go.theregister.com/feed/www.theregister.com/2025/11/06/most_common_passwords/

Data Privacy and Regulatory Issues 🔒

- The EU Parliament's Civil Liberties Committee (LIBE) has voted to advance a controversial proposal expanding Europol's data sharing and biometric data collection capabilities. While aimed at combating human trafficking and migrant smuggling, privacy advocates warn it could facilitate mass surveillance and significant data privacy violations across Europe.
- In a decisive move against cybercrime, a Chinese court has sentenced five leaders of a Myanmar crime syndicate to death. The syndicate ran industrial-scale scamming compounds near the China-Myanmar border, defrauding over $4 billion and causing six deaths, highlighting Beijing's severe crackdown on cross-border cyber fraud.

đŸ—žïž The Record | https://therecord.media/eu-parliament-committee-votes-europol-data-sharing-agreement
đŸ—žïž The Record | https://therecord.media/china-sentences-5-myanmar-scam-kingpins-to-death

#CyberSecurity #ThreatIntelligence #DataBreach #Ransomware #Malware #APT #NationState #Vulnerabilities #Cisco #Gootloader #Sandworm #Europol #DataPrivacy #InfoSec #CyberAttack #IncidentResponse

Hyundai AutoEver America data breach exposes SSNs, drivers licenses

Hyundai AutoEver America is notifying individuals that hackers breached the company's IT environment and gained access to personal information.

BleepingComputer

Gootloader’s back—and it’s smarter. The new GootBot variant is evading defenses and targeting industries like healthcare. Are we ready for what’s next?

https://thedefendopsdiaries.com/gootloaders-evolving-threat-new-tactics-targets-and-defensive-strategies-in-2024/

#gootloader
#malwaretrends
#cybersecurity2024
#threatintelligence
#infosec
#gootbot
#seoattacks
#healthcaresecurity
#ransomware

Gootloader’s Evolving Threat: New Tactics, Targets, and Defensive Strategies in 2024

Explore Gootloader’s latest tactics, new GootBot variant, targeted industries, and essential defense strategies for organizations in 2024.

The DefendOps Diaries

Gootloader is back with a vengeance—this time featuring the stealthy GootBot that spreads through networks and ups its SEO poisoning game. With targets from legal to healthcare, are we ready for its next-gen tactics?

https://thedefendopsdiaries.com/gootloaders-evolving-threat-new-tactics-targets-and-defensive-strategies-in-2024/

#gootloader
#malwaretrends
#cybersecurity2024
#threatintelligence
#infosec
#gootbot
#seoattacks
#healthcaresecurity
#ransomware

Gootloader’s Evolving Threat: New Tactics, Targets, and Defensive Strategies in 2024

Explore Gootloader’s latest tactics, new GootBot variant, targeted industries, and essential defense strategies for organizations in 2024.

The DefendOps Diaries

đŸ›Ąïž Business security requires dealing with different types of threats, from mobile #malware to Python-based stealers. Let us show you exactly how you can do it đŸ‘šâ€đŸ’»

Check out analysis of several hard-to-catch threats, including #GootLoader âŹ‡ïž
https://any.run/cybersecurity-blog/how-to-analyze-malware-threats/?utm_source=mastodon&utm_medium=post&utm_campaign=how_to_analyze_threats&utm_content=linktoblog&utm_term=270525

#infosec #cybersecurity

How to Analyze Node.js, Python, Android, and Linux Malware

See hands-on examples of how you can analyze and detect hard-to-catch malware using ANY.RUN's Interactive Sandbox.

ANY.RUN's Cybersecurity Blog
#Gootloader #Malware Resurfaces in #Google Ads for Legal Docs. Attackers target a familiar industry, law professionals, by hiding the infostealer in ads delivered via Google-based malvertising.
https://www.darkreading.com/cyberattacks-data-breaches/gootloader-malware-google-ads-legal-docs