Attention WordPress Users: GootLoader Makes a Comeback with Font Exploit to Distribute Malware

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Gootloader Malware Resurfaces After Extended Absence

  • Re-emergence of Gootloader malware was noted in late October 2025, reinitiating ransomware attack campaigns.
  • Utilizes nefarious JavaScript embedded in bespoke web fonts, facilitating discreet remote access and network inspections.
  • Tied to cybercriminal groups Storm-0494 and Vice Society, attackers can reportedly infiltrate domain controllers within an hour.

After an extended hiatus of nine months, the notorious Gootloader malware has reappeared, ostensibly paving the way for renewed ransomware assaults.

Cybersecurity collective Huntress reported a surge in infections commencing October 27 and continuing into early November 2025. Prior to this resurgence, Gootloader had remained dormant since March 2025.

Exploiting Custom Fonts for Malicious Activity

In this latest offensive, Gootloader has seemingly been wielded by the hacking collective Storm-0494, along with its affiliate known as Vice Society (formerly Vanilla Tempest). This ransomware syndicate, first spotted in 2021, primarily targets educational and healthcare institutions while occasionally encroaching upon manufacturing sectors.

Gootloader deploys malicious JavaScript sourced from compromised websites. This script orchestrates installations that provide adversaries with remote control over corporate Windows environments, enabling actions such as account compromises or ransomware dissemination.

Malicious filenames and download directives are ingeniously concealed within a custom web font (WOFF2) so that the webpage appears unremarkable in a browser, presenting gibberish when viewed in its raw HTML format. Only upon rendering in the browser does the true download link and filename come into focus.

The overarching intent of this campaign is to secure reliable initial access, expedite network mapping and control, and subsequently transfer this access to ransomware actors.

This entire sequence is executed with remarkable speed, largely through automated reconnaissance and remote operational tools that ascertain high-value targets, establish privileged accounts, and ready the environment for ransomware deployment.

According to Huntress, in several instances, attackers successfully accessed domain controllers within mere hours. Initial automated reconnaissance frequently initiates within 10 to 20 minutes post-execution of the malicious JavaScript.

software-coding-programming-developer-editor-javascript

Disturbingly, there have been reports of operators attaining domain controller access in as little as 17 hours, with one environment experiencing a breach in under an hour.

To safeguard against Gootloader, Huntress recommends vigilance for early warning indicators such as unsolicited downloads from web browsers, unfamiliar shortcuts in startup directories, unexpected PowerShell or script activities originating from browsers, and anomalous outbound proxy-like connections.

Source link: Techradar.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading