New GootLoader Malware Variant Evades Detection and Spreads Rapidly,
A new variant of the GootLoader malware called GootBot has been found to facilitate lateral movement on compromised systems and evade detection.
« The GootLoader group’s introduction of their own custom bot into the late stages of their attack chain is an attempt to avoid detections when using off-the-shelf tools for C2 such as CobaltStrike or RDP, » IBM X-Force researchers Golo Mühr and Ole
« The GootLoader group’s introduction of their own custom bot into the late stages of their attack chain is an attempt to avoid detections when using off-the-shelf tools for C2 such as CobaltStrike or RDP, » IBM X-Force researchers Golo Mühr and Ole
,
A new variant of the GootLoader malware called GootBot has been found to facilitate lateral movement on compromised systems and evade detection.
« The GootLoader group’s introduction of their own custom bot into the late stages of their attack chain is an attempt to avoid detections when using off-the-shelf tools for C2 such as CobaltStrike or RDP, » IBM X-Force researchers Golo Mühr and Ole
« The GootLoader group’s introduction of their own custom bot into the late stages of their attack chain is an attempt to avoid detections when using off-the-shelf tools for C2 such as CobaltStrike or RDP, » IBM X-Force researchers Golo Mühr and Ole
, ,
https://thehackernews.com/2023/11/new-gootloader-malware-variant-evades.html