Security

Research

Cybercrooks are targeting Bengal cat lovers in Australia for some reason

In case today’s news cycle wasn’t shocking enough, here’s a gem from Sophos


Fresh from a series of serious reports detailing its five-year battle with Chinese cyberattackers, Sophos has dropped a curious story about users of a popular infostealer-cum-RAT targeting a niche group of victims.

Around since 2014, Gootloader has been one of the most popular malware strains of its kind. It's used as an infostealer or at times a malware dropper acting as a precursor to other attacks like ransomware. 

Financially motivated attackers typically cast their net far and wide or target specific, high-value organizations and/or individuals such as banks and crypto investors. It's what makes the security shop's finding that criminals, armed with Gootloader, were seemingly targeting Australian enthusiasts of Bengal cats all the more baffling.

You see, Gootloaderers are known for using SEO poisoning tactics to deploy their wares on unsuspecting victims. Sophos began a "broad threat hunting" investigation into the malware after a new variant popped up in March, finding signs that these tactics were being used to target individuals who searched: "Are Bengal cats legal in Australia?" and similar queries.

In one example, the researchers showed how the first website returned following a search engine query – an SEO-poisoned forum – containing posts with hyperlinked text. When clicked, this immediately led to the download of a suspicious ZIP file, which executed the first stage of the malware's payload. 

The user's browser was also redirected to a different website which dropped a large JavaScript file and researchers noted many processes being spun up on the victim's machine.

Among these processes, there appeared to be signs of the crooks establishing persistence and passing commands to PowerShell to deploy Gootkit, the third stage of the malware that leads to tools like Cobalt Strike and ransomware being dropped.

"Gootloader is one of a number of continuing malware-delivery-as-a-service operations that heavily leverage search results as a means to reach victims," the researchers said in their blog, which also features more technical analysis and IOCs. 

"The use of search engine optimization, and abuse of search engine advertising to lure targets to download malware loaders and droppers, are not new – Gootloader has been doing this since at least 2020, and we've observed Raccoon Stealer and other malware-as-a-service operations doing the same for just as long. 

"But we've seen continued growth in this approach to initial compromise, with several massive campaigns using this technique over the past year."

SEO poisoning and malvertising go hand-in-hand, but the latter has received special attention recently from researchers to national security agencies.

NCC Group said earlier this year that the tactic is ever-popular in the cybercrime ecosystem, benefitting initial access brokers (IABs) and ransomware crooks alike. 

Malvertising often involves promoted websites serving trojanized versions of legitimate apps. These typically have infostealer capabilities and the credentials they harvest are then sent back to and sold by IABs whose clientele heavily consists of ransomware affiliates. 

Researchers spoke last year of how ALPHV/BlackCat, the now-fallen but once-grand figurehead of the ransomware scene, was using malvertising tactics as part of affiliates' initial access routine, for example.

And as recently as today, national cybersecurity agencies like the UK's NCSC are still working with advertisers to help quell the scourge of malvertising, given its close relationship with ransomware.

Naturally, Google has caught some flak for "allowing" this activity to thrive in its search engine results, but consistently defends its case, highlighting how it's not allowed and when reported, sites are often delisted from search results. ®

Send us news
15 Comments

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more

Iran-linked crew used custom 'cyberweapon' in US critical infrastructure attacks

IOCONTROL targets IoT and OT devices from a ton of makers, apparently

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push

Holiday cheer comes in the form of three arrests and 27 shuttered domains

Fully patched Cleo products under renewed 'zero-day-ish' mass attack

Thousands of servers targeted while customers wait for patches

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

What do ransomware and Jesus have in common? A birth month and an unwillingness to die

35 years since AIDS first borked a PC and we're still no closer to a solution

'That's not a bug, it's a feature' takes on a darker tone when malware's involved

Mummy, where do zero days come from?

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

Infosec experts divided on AI's potential to assist red teams

Yes, LLMs can do the heavy lifting. But good luck getting one to give evidence