By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites
Computing

GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites

News Room
Last updated: 2025/11/11 at 11:04 AM
News Room Published 11 November 2025
Share
GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites
SHARE

Nov 11, 2025Ravie LakshmananMalware / Network Security

The malware known as GootLoader has resurfaced yet again after a brief spike in activity earlier this March, according to new findings from Huntress.

The cybersecurity company said it observed three GootLoader infections since October 27, 2025, out of which two resulted in hands-on keyboard intrusions with domain controller compromise taking place within 17 hours of initial infection.

“GootLoader is back and now leveraging custom WOFF2 fonts with glyph substitution to obfuscate filenames,” security researcher Anna Pham said, adding the malware “exploits WordPress comment endpoints to deliver XOR-encrypted ZIP payloads with unique keys per file.”

GootLoader, affiliated with a threat actor tracked as Hive0127 (aka UNC2565), is a JavaScript-based malware loader that’s often distributed via search engine optimization (SEO) poisoning tactics to deliver additional payloads, including ransomware.

DFIR Retainer Services

In a report published last September, Microsoft revealed the threat actor referred to as Vanilla Tempest receives hand-offs from GootLoader infections by the threat actor Storm-0494, leveraging the access to drop a backdoor called Supper (aka SocksShell or ZAPCAT), as well as AnyDesk for remote access. These attack chains have led to the deployment of INC ransomware.

It’s worth noting that Supper has also been grouped together with Interlock RAT (aka NodeSnake), another malware primarily associated with Interlock ransomware. “While there is no direct evidence of Interlock using Supper, both Interlock and Vice Society have been associated with Rhysida at different times, suggesting possible overlaps in the broader cybercriminal ecosystem,” Foresecout noted last month.

Then, earlier this year, the threat actor behind GootLoader was found to have leveraged Google Ads to target victims looking for legal templates, such as agreements, on search engines to redirect them to compromised WordPress sites hosting malware-laced ZIP archives.

The latest attack sequence documented by Huntress shows that searches for terms like “missouri cover utility easement roadway” on Bing are being used to direct unsuspecting users to deliver the ZIP archive. What’s notable this time around is the use of a custom web font to obfuscate the filenames displayed on the browser so as to defeat static analysis methods.

“So, when the user attempts to copy the filename or inspect the source code – they will see weird characters like ‛›μI€vSO₽*’Oaμ==€‚‚33O%33‚€×:O[TM€v3cwv,,” Pham explained.

“However, when rendered in the victim’s browser, these same characters magically transform into perfectly readable text like Florida_HOA_Committee_Meeting_Guide.pdf. This is achieved through a custom WOFF2 font file that Gootloader embeds directly into the JavaScript code of the page using Z85 encoding, a Base85 variant that compresses the 32KB font into a 40K.”

Also observed is a new trick that modifies the ZIP file such that when opened with tools like VirusTotal, Python’s ZIP utilities, or 7-Zip, it unpacks as a harmless-looking .TXT file. On Windows File Explorer, the archive extracts a valid JavaScript file, which is the intended payload.

CIS Build Kits

“This simple evasion technique buys the actor time by hiding the true nature of the payload from automated analysis,” a security researcher, who has long been tracking the malware under the pseudonym “GootLoader,” said of the evolution.

The JavaScript payload present within the archive is designed to deploy Supper, a backdoor capable of remote control and SOCKS5 proxying. In at least one instance, the threat actors are said to have used Windows Remote Management (WinRM) to move laterally to the Domain Controller and create a new user with admin-level access.

“The Supper SOCKS5 backdoor uses tedious obfuscation protecting simple functionality – API hammering, runtime shellcode construction, and custom encryption add analysis headaches, but the core capabilities remain deliberately basic: SOCKS proxying and remote shell access,” Huntress said.

“This ‘good enough’ approach proves that threat actors don’t need cutting-edge exploits when properly obfuscated bread-and-butter tools achieve their objectives.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Scientists Invented A New Refrigerator Cycle That Changes Everything – BGR Scientists Invented A New Refrigerator Cycle That Changes Everything – BGR
Next Article Nothing’s Headphone 1 are an absolute steal for £199 in this early Black Friday deal Nothing’s Headphone 1 are an absolute steal for £199 in this early Black Friday deal
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Convergence and divergence in US and EU policies on China
Convergence and divergence in US and EU policies on China
News
111,000 spiders in the same cave!
111,000 spiders in the same cave!
Mobile
Linux 6.18 Merges Fix For “Catastrophic Performance Issue” On 64-bit ARM
Linux 6.18 Merges Fix For “Catastrophic Performance Issue” On 64-bit ARM
Computing
A Far-Reaching Aurora Is Coming Tuesday and Wednesday Night: Here's Where You May See It
A Far-Reaching Aurora Is Coming Tuesday and Wednesday Night: Here's Where You May See It
News

You Might also Like

Linux 6.18 Merges Fix For “Catastrophic Performance Issue” On 64-bit ARM
Computing

Linux 6.18 Merges Fix For “Catastrophic Performance Issue” On 64-bit ARM

4 Min Read
Nobel Prize Winner Forms Alliance with HPE and Chipmakers to Build Scalable Quantum Computers | HackerNoon
Computing

Nobel Prize Winner Forms Alliance with HPE and Chipmakers to Build Scalable Quantum Computers | HackerNoon

1 Min Read
I tried 6 crazy apps so you don’t have to (but you probably still should)
Computing

I tried 6 crazy apps so you don’t have to (but you probably still should)

9 Min Read
From Lifeline To Leading Edge: AirTalk Wireless’s Journey To Smarter, Seamless Access  | HackerNoon
Computing

From Lifeline To Leading Edge: AirTalk Wireless’s Journey To Smarter, Seamless Access | HackerNoon

0 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?