Hey folks! 🌟 Just spotted something techy on the horizon. Looks like the Gootkit crew might be trying to up their game. We've been keeping an eye on their moves and it looks like they’ve made some sneaky changes to their setup. 🕵️‍♂️

I've got all the juicy details in my latest article. It's a quick read and might just be the heads-up you need to keep your digital space a no-go zone for these tricky characters. 🚫💻

Swing by and give it a read at https://malasada.tech/is-gootkit-updating-their-c2-infrastructure/. Let's stay sharp and stay ahead of the game! 🧠✨

#Cybersecurity #TechNews #StayProtected #Gootkit

Is Gootkit Updating Their C2 Infrastructure? - Malasada Tech

Discover the latest strategies in cyber warfare with our investigative piece on Gootkit malware's evolving C2 infrastructure. Uncover insights into how the removal of xmlrpc.php signals a new phase in cybercriminal tactics and what it means for digital security defenses. Stay informed on the forefront of cybersecurity developments with our in-depth analysis.

Malasada Tech

🚨🔥**Breaking News in #CyberSecurity**🔥🚨

💻 Just uncovered a new batch of IOCs for #Gootkit malware! Check out the details and stay protected! 💻🔒

🔗 Sample spotted at: alma-ingegneria.it/finance-sector-union-enterprise-agreement/ 🔗

🛠️ SHA256 Magic Code: 05378218A1D0038A00B3E956E0890BCE57078B755334EE5DE18DCEC51138683A 🛠️

📦 Suspicious File Alert: Finance_sector_union_enterprise_agreement_96120.zip 📦

🔊 Serving IOC whispers from: colliercpas.com/doc.php 🔊

🌐 Beaconing URLs Alert 🚨:
- naghsheshahr.com/xmlrpc.php
- theceostory.in/xmlrpc.php
- copenhagencontemporary.org/xmlrpc.php
- sparo1.se/xmlrpc.php
- headofthehooch.org/xmlrpc.php
- internationalliving.com/xmlrpc.php
- thll.org.tw/xmlrpc.php
- estedavivere.it/xmlrpc.php
- muskun.com/xmlrpc.php
- nagradnaigra.com.hr/xmlrpc.php

Stay vigilant and update your defense systems! 🛡️💡

#MalwareResearch #CyberSec #InfoSec #ThreatIntelligence 🌍💫🔐

#Gootloader is a highly active banking Trojan-turned-loader #malware that has recently appeared on multiple vendors’ priority threat lists, attacking organizations in a wide range of verticals & countries. If your leadership or other stakeholders asked for a list of this threat's most common TTPs, would you be able to provide it quickly?

Now you can, with the Gootloader #TTP matrix available in Tidal’s free Community Edition: https://app.tidalcyber.com/share/796cacb6-3bb1-474b-9747-abcce2c47de2

Gootloader, also referred to by its related payload, #Gootkit, first emerged in 2014 but has been especially active since 2020. Despite this, technical reporting around its TTPs has been relatively light until even more recently. In the past two years alone, verticals including finance, #healthcare, defense, pharmaceutical, energy, & automotive have faced Gootloader campaigns, with victims across North America, Western Europe, & South Korea, and the malware is regularly used to deliver high-impact payloads, including Cobalt Strike, #IcedID (a common #ransomware precursor), & more. Industry-based #threat profiling can be a powerful tool, but even if your industry (or your corner of it) hasn’t yet directly observed Gootloader activity, we believe broad-based threats like this should be on most teams’ radars

Our matrix summarizes Gootloader TTPs detailed across several great recent technical reports. Reports from SentinelLabs, Cybereason, & The DFIR Report were helpfully pre-mapped to #mitreattack, and we mapped a couple other detailed analyses. Procedural details are even available for nearly all the included technique mappings – be sure to click the Technique Set’s label in the ribbon at the top of the screen to pivot into the Details page with this information & relevant source links throughout

Red Canary & The DFIR Report helpfully provided tool-agnostic suggested #detection logic for key behaviors observed during recent Gootloader campaigns here https://redcanary.com/blog/gootloader/ and here https://thedfirreport.com/2022/05/09/seo-poisoning-a-gootloader-story/. Take a wider view by layering entire segments of your defensive stack over the #CTI back in the Community Edition, by toggling on any of the mappings available in @tidalcyber's Product Registry https://app.tidalcyber.com/vendors

#SharedWithTidal #threatinformeddefense #CobaltStrike #initialaccess #blueteam

Tidal Cyber

Threat-Informed Defense

Gootkit Malware Continues to Evolve with New Components and Obfuscations
https://thehackernews.com/2023/01/gootkit-malware-continues-to-evolve.html #Cybercrime #Malware #Gootkit #Gootloader
Gootkit Malware Continues to Evolve with New Components and Obfuscations

Gootkit malware continues to evolve and become more sophisticated, with notable changes to the toolkit, adding new components and obfuscations.

The Hacker News
Gootkit Loader Actively Targets Australian Healthcare Industry

We analyzed the infection routine used in recent Gootkit loader attacks on the Australian healthcare industry and found that Gootkit leveraged SEO poisoning for its initial access and abused legitimate tools like VLC Media Player.

Trend Micro
Gootkit Loader campaign targets Australian Healthcare Industry

Threat actors are targeting organizations in the Australian healthcare sector with the Gootkit malware loader. Trend Micro researchers warn that Gootkit Loader is actively targeting the Australian healthcare industry. The experts analyzed a series of attacks and discovered that Gootkit leveraged SEO poisoning for its initial access and abused legitimate tools like VLC Media Player. […]

Security Affairs
I wrote a detailed email to @[email protected] @[email protected] and the owner of the affected site and will perform further investigation. #Gootkit

RT @[email protected]

Basierend auf Sinkhole-Daten hat CERT-Bund in den letzten Wochen täglich durchschnittlich ca. 20.000 Infektionen in Deutschland mit dem Schadprogramm #Gootkit an die zuständigen Netzbetreiber/Provider gemeldet.

https://blog.malwarebytes.com/threat-analysis/2020/11/german-users-targeted-with-gootkit-banker-or-revil-ransomware/

🐦🔗: https://twitter.com/certbund/status/1333775848202186753

German users targeted with Gootkit banker or REvil ransomware - Malwarebytes Labs

After a noted absence, the Gootkit banking Trojan returns en masse to hit Germany. In an interesting twist, some of the victims may receive ransomware instead.

Malwarebytes Labs
Unser werktäglicher News-Überblick fasst die wichtigsten Nachrichten des Tages kurz und knapp zusammen.
Kurz informiert: Corona-Impfstoff, Proteinfaltung, Gootkit, Pokémon
Kurz informiert: Corona-Impfstoff, Proteinfaltung, Gootkit, Pokémon

Unser werktäglicher News-Überblick fasst die wichtigsten Nachrichten des Tages kurz und knapp zusammen.

Das CERT-Bund und verschiedene Sicherheitsforscher warnen vor Trojaner-Attacken. Infektionen sind aber nicht ohne Weiteres möglich.
Banking-Malware Gootkit ist zurück und hat es auf PCs in Deutschland abgesehen
Banking-Malware Gootkit ist zurück und hat es auf PCs in Deutschland abgesehen

Das CERT-Bund und verschiedene Sicherheitsforscher warnen vor Trojaner-Attacken. Infektionen sind aber nicht ohne Weiteres möglich.