Gootloader malware returns with fake NDA scam – here’s what we know



  • Gootloader malware resurfaces using malvertising and SEO poisoning to spread infections
  • Attackers now obfuscate malware names using deceptive web fonts and glyph swapping
  • Loader delivers ransomware, infostealers, and Cobalt Strike via compromised search results

The Gootloader malware scam, which was thought to have been disrupted and shut down in March 2025, has returned with both old, and new tricks, experts have warned.

Gootloader is known for using malvertising and SEO poisoning to distribute the malware. Cybercriminals would either create websites, or infiltrate legitimate ones, and rearrange them to host different documents, such as NDA templates. Then they would purchase ads on popular ad networks, or engage in SEO poisoning – creating countless web articles and filling them up with keywords linking back to the sites under their control.


https://cdn.mos.cms.futurecdn.net/37uyEphcLreEFNUVCQzurn-2560-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img