The Gootloader Group, previously known only as an initial access broker (IAB) and malware operator, has unleashed a destructive new post-compromise tool, GootBot, which spreads bots throughout enterprise environments following a compromise.
Gootloader (also tracked under Hive0127 and UNC2565) has been active since 2014 and uses SEO poisoning to fool victims into downloading infected business document templates — contracts and forms — for initial compromise, researchers at IBM X-Force threat intelligence group said in a new advisory.
Typically, Gootloader would then broker that access off to other threat groups who would use tools like CobaltStrike or Remote Desktop Protocl (RDP) to spread throughout the network, the researchers explained. But a new tool the group has begun deploying is the much more destructive GootBot post-compromise malware, which, after Gootloader’s initial compromise, deploys a very difficult to detect bot army.
The IBM X-Force group explained, alarmingly, each bot is controlled by its own command-and-control server (C2) running on a breached WordPress site. Once deployed, the bots begin searching out a domain controller.
Worse yet, GootBot, as of Nov. 6, has no detections listed on VirusTotal, the researchers added.
“This shift in TTPs and tooling heightens the risk of successful post-exploitation stages, such as Gootloader-linked ransomware affiliate activity,” the report warned.