SEO poisoning targeting public sector (Gootloader) Advisory - 20230615002¶
Overview¶
Since initial advice on the 19th of August 2022 (SEO poisoning targeting public sector (Gootloader) Ref: 20220819002), WA SOC have observed continuous active attempts of SEO poisoning for the deployment of Gootloader malware affecting multiple WA SOC agencies.
Based on multiple evidence we observed, we have updated threat hunting methods and detection for this attack.
Detection¶
Run the following threat hunting search on files and URLs that might be downloaded from GootLoader infected website
Non-KQL SIEM, search on the following regex-pattern on Files and File download origin
- File:
\((\d{4,6})\)\.zip
- File URL origin:
\.php\?(.*=){3}.+$
Microsoft Sentinel KQL / Defender Threat Hunting blade |
Indicator of Compromise¶
Please be advised of the following observed IOCs for detection in your environment:
FileName¶
- Water corporation enterprise agreement 2018 wa (73606).zip - N/A (MD5)
- public sector csa agreement 2021 pay rates(18764).zip - 514affc78fccc14b67af699c898ec09a(MD5)
- public sector csa agreement 2021 pay rates(60706).zip - af4f04edf5ec0b7555b3b70819acbfdd(MD5)
- public sector csa agreement 2021 pay rates (32089).zip f_011b45 - 641eaa8aaa45375ca0743109ac6ca652(MD5)
Domain Names¶
Note the below domains have not been defanged, please exercise caution when utilizing.
- k-reform[.]jp/forum[.]php
- lottolong[.]com/blog[.]php
- messagesmusicaux[.]com/search[.]php
- sicherheitsingenieure-huber[.]de/content[.]php
Kusto query 1 //based on regex of filenames being downloaded.
Kusto query 2 //replace domains with relative gootloader domains
What is the threat?¶
Based on article written by Trend Micro, Gootkit loader uses fileless techniques to download and deliver various ransomware payload such as SunCrypt, and REvil (Sodinokibi) ransomware, Kronos trojans, and Cobalt Strike.
We have observed agency with EDR capabilities have been able to effectively stop GootKit/ Gootloader malware during the execution phase (when user accidentally clicked the malicious .js file). However, it should be noted that persistence mechanism might have been successfully installed to user device.