More

    Gootloader malware returns with fake NDA scam – here’s what we know



    • Gootloader malware resurfaces using malvertising and SEO poisoning to spread infections
    • Attackers now obfuscate malware names using deceptive web fonts and glyph swapping
    • Loader delivers ransomware, infostealers, and Cobalt Strike via compromised search results

    The Gootloader malware scam, which was thought to have been disrupted and shut down in March 2025, has returned with both old, and new tricks, experts have warned.

    Gootloader is known for using malvertising and SEO poisoning to distribute the malware. Cybercriminals would either create websites, or infiltrate legitimate ones, and rearrange them to host different documents, such as NDA templates. Then they would purchase ads on popular ad networks, or engage in SEO poisoning – creating countless web articles and filling them up with keywords linking back to the sites under their control.


    https://cdn.mos.cms.futurecdn.net/37uyEphcLreEFNUVCQzurn-2560-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img