This odd malware tricks Google to boost your website's SEO - then it attacks

Skull and Bones
(Image credit: Pixabay)

Security researchers have discovered a novel malware delivery mechanism that climbs to the top of any search results after tricking Google’s famed SEO (Search Engine Optimization) algorithm.

While the Gootkit malware itself has been around for several years, and has been analyzed by cybersecurity firm Sophos in the past, it is its new delivery mechanism, which has earned it the nickname Gootloader and is the subject of their recent analysis

“Gootloader uses malicious search engine optimization (SEO) techniques to squirm into Google search results. The way it accomplishes this task deserves some discussion, because it centers as much around technology as human psychology,” shares Sophos.

Search engine deoptimization

In their breakdown of the delivery mechanism, the researchers estimate that the operators of the malware run a network of about 400 servers that serve hacked versions of legitimate websites. 

To  illustrate the effectiveness of this method, the researchers published screenshots that show Google returning one of the websites run by the malware operators as the first result. Even more impressive is the fact that the hacked website belonged to a neonatal clinic while the search query centered on real estate.

When clicked, the hacked website will appear to legitimately provide an answer to the search query, which will involve downloading a zip file, which obviously contains the malware.

Gootloader in action

(Image credit: Sophos)

The researchers share that as per their analysis, many of the hacked websites were running well-known content management systems (CMS), without naming them. The threat actors have tweaked the backend that fetches and runs a script to make the websites present a slightly modified version of the original information based on the victim’s search query. 

The researchers note that this new mechanism is being used to not just spread Gootkit, but several other trojans and ransomware such as Kronos, REvil, Cobalt Strike, and more.

Sophos claims that it is the layers of tricks that makes this delivery mechanism so effective. “At several points, it’s possible for end users to avoid the infection, if they recognize the signs. The problem is that even trained people can easily be fooled by the chain of social engineering tricks Gootloader’s creators use,” believe the researchers.

Via ZDNet

TOPICS
Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
malware
Google warns of legit VPN apps being used to infect devices with malware
DeepSeek
Fake DeepSeek installers are infecting your device with dangerous malware
Representational image of a cybercriminal
Criminals are spreading malware disguised as DeepSeek AI
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Mac users targeted with new malware, so be on your guard
Fraude en ligne phishing
Google Search ads are being hacked to steal account info
Trojan
Hackers hide malware into website images to go unnoticed
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras