Security

Research

Cybercrooks are targeting Bengal cat lovers in Australia for some reason

In case today’s news cycle wasn’t shocking enough, here’s a gem from Sophos


Fresh from a series of serious reports detailing its five-year battle with Chinese cyberattackers, Sophos has dropped a curious story about users of a popular infostealer-cum-RAT targeting a niche group of victims.

Around since 2014, Gootloader has been one of the most popular malware strains of its kind. It's used as an infostealer or at times a malware dropper acting as a precursor to other attacks like ransomware. 

Financially motivated attackers typically cast their net far and wide or target specific, high-value organizations and/or individuals such as banks and crypto investors. It's what makes the security shop's finding that criminals, armed with Gootloader, were seemingly targeting Australian enthusiasts of Bengal cats all the more baffling.

You see, Gootloaderers are known for using SEO poisoning tactics to deploy their wares on unsuspecting victims. Sophos began a "broad threat hunting" investigation into the malware after a new variant popped up in March, finding signs that these tactics were being used to target individuals who searched: "Are Bengal cats legal in Australia?" and similar queries.

In one example, the researchers showed how the first website returned following a search engine query – an SEO-poisoned forum – containing posts with hyperlinked text. When clicked, this immediately led to the download of a suspicious ZIP file, which executed the first stage of the malware's payload. 

The user's browser was also redirected to a different website which dropped a large JavaScript file and researchers noted many processes being spun up on the victim's machine.

Among these processes, there appeared to be signs of the crooks establishing persistence and passing commands to PowerShell to deploy Gootkit, the third stage of the malware that leads to tools like Cobalt Strike and ransomware being dropped.

"Gootloader is one of a number of continuing malware-delivery-as-a-service operations that heavily leverage search results as a means to reach victims," the researchers said in their blog, which also features more technical analysis and IOCs. 

"The use of search engine optimization, and abuse of search engine advertising to lure targets to download malware loaders and droppers, are not new – Gootloader has been doing this since at least 2020, and we've observed Raccoon Stealer and other malware-as-a-service operations doing the same for just as long. 

"But we've seen continued growth in this approach to initial compromise, with several massive campaigns using this technique over the past year."

SEO poisoning and malvertising go hand-in-hand, but the latter has received special attention recently from researchers to national security agencies.

NCC Group said earlier this year that the tactic is ever-popular in the cybercrime ecosystem, benefitting initial access brokers (IABs) and ransomware crooks alike. 

Malvertising often involves promoted websites serving trojanized versions of legitimate apps. These typically have infostealer capabilities and the credentials they harvest are then sent back to and sold by IABs whose clientele heavily consists of ransomware affiliates. 

Researchers spoke last year of how ALPHV/BlackCat, the now-fallen but once-grand figurehead of the ransomware scene, was using malvertising tactics as part of affiliates' initial access routine, for example.

And as recently as today, national cybersecurity agencies like the UK's NCSC are still working with advertisers to help quell the scourge of malvertising, given its close relationship with ransomware.

Naturally, Google has caught some flak for "allowing" this activity to thrive in its search engine results, but consistently defends its case, highlighting how it's not allowed and when reported, sites are often delisted from search results. ®

Send us news
15 Comments

FBI wipes Chinese PlugX malware from thousands of Windows PCs in America

Hey, Xi: Zài jiàn!

FireScam infostealer poses as Telegram Premium app to surveil Android devices

Once installed, it helps itself to your data like it's a free buffet

Drug addiction treatment service admits attackers stole sensitive patient data

Details of afflictions and care plastered online

Crypto klepto North Korea stole $659M over just 5 heists last year

US, Japan, South Korea vow to intensify counter efforts

Japanese police claim China ran five-year cyberattack campaign targeting local orgs

‘MirrorFace’ group found ways to run malware in the Windows sandbox, which may be worrying

I tried hard, but didn't fix all of cybersecurity, admits outgoing US National Cyber Director

In colossal surprise, ONCD boss Harry Coker says more work is needed

Datacus extractus: Harry Potter publisher breached without resorting to magic

PLUS: Allstate sued for allegedly tracking drivers; Dutch DDoS; More fake jobs from Pyongyang; and more

Zero-day exploits plague Ivanti Connect Secure appliances for second year running

Factory resets and apply patches is the advice amid fortnight delay for other appliances

DEF CON's hacker-in-chief faces fortune in medical bills after paralyzing neck injury

Marc Rogers is 'lucky to be alive'

Fortinet: FortiGate config leaks are genuine but misleading

Competition hots up with Ivanti over who can have the worst start to a year

Medusa ransomware group claims attack on UK's Gateshead Council

Pastes allegedly stolen documents on leak site with £600K demand

Europe coughs up €400 to punter after breaking its own GDPR data protection rules

PLUS: Data broker leak reveals extent of info trading; Hot new ransomware gang might be all AI, no bark; and more