The malware loader is back with advanced evasion techniques targeting users searching for legal document templates.
The Gootloader malware operation has resumed activity after a 7-month break, once again using SEO poisoning to promote fake websites that lure users into downloading malicious JavaScript files. The campaign primarily targets individuals searching for legal templates, such as NDAs or contracts, using deceptive tactics to distribute malware via attacker-controlled or compromised websites.
These websites appear in search engine results and display fake document-sharing platforms. When users attempt to download a document, they are served a ZIP archive containing a .js file that initiates Gootloader, which then downloads additional malware like backdoors, bots, or Cobalt Strike, often used to stage ransomware attacks.
Security researchers tracking Gootloader say the operation stopped abruptly on March 31, 2025, following takedown efforts. It has now returned with an expanded campaign involving over 100 domains and thousands of SEO keywords.
The latest variant uses several advanced techniques to avoid detection:
According to the Gootloader researcher and Huntress Labs’ Anna Pham, the campaign’s goal remains unchanged: gain initial access through misleading downloads and escalate to full network compromise. Their latest blog post outlines the font-based obfuscation as a key innovation in this wave. Researchers from The DFIR Report added insights into the ZIP file manipulation technique, indicating the malware’s growing sophistication.
According to The Register, “What makes Gootloader particularly dangerous is the speed of the attack chain,” said Steven Pham. “The research shows that organizations have a narrow window to detect and respond before threat actors achieve domain controller compromise and begin ransomware preparation activities.”
SEO poisoning manipulates search engine rankings to push malicious websites to the top of search results, increasing the chance that unsuspecting users will click and download malware.
It swaps the visible appearance of letters using a custom font, so what looks like random characters in the HTML source appears as real words when rendered, making it harder for detection tools to flag malicious content.
Supper is a remote access tool used to maintain control over infected devices. It's linked to Vanilla Tempest, a ransomware affiliate known to work with multiple ransomware operators.
The ZIP archives are malformed to exploit differences in how tools handle file metadata, extracting malicious content on some systems while appearing harmless on others, avoiding sandbox detection.
Do not download templates or legal forms from unknown websites, use endpoint protection with behavioral detection, and verify URLs before interacting with downloads promoted through search engines.