www.deepwatch.com
Open in
urlscan Pro
2606:4700:10::6814:ca25
Public Scan
URL:
https://www.deepwatch.com/labs/gootloader-poisoned-blogs-uncovered-by-deepwatchs-ati-team/
Submission: On September 26 via api from IN — Scanned from DE
Submission: On September 26 via api from IN — Scanned from DE
Form analysis
0 forms found in the DOMText Content
This website is AudioEye enabled and is being optimized for accessibility. To open the AudioEye Toolbar, press "shift + =". Some assistive technologies may require the use of a passthrough function before this keystroke. For more information, activate the button labeled “Explore your accessibility options”. This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Privacy Policy. If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked. Accept Decline Skip to content * Why Deepwatch?Open menu * Squad Delivery Model * Deepwatch Platform * Deepwatch Secure Score * Deepwatch Labs * SolutionsOpen menu * Managed Detection and Response (MDR) * MDR Enterprise * MDR Essentials * Managed Extended Detection Response (MXDR) * Endpoint Detection and Response (EDR) * Vulnerability Management (VM) * Firewall Management Solution * CompanyOpen menu * About * Leadership * Careers * Contact * PartnersOpen menu * Channel Partners * Technology Alliance Partners * ResourcesOpen menu * Resource Library * Blog * Case Studies * eBooks * Whitepapers * Datasheets * Video * Education Center * Newsroom * Events * Ready to Talk? 09.22.22 GOOTLOADER POISONED BLOGS UNCOVERED BY DEEPWATCH’S ATI TEAM BY BEN NICHOLS, ERIC FORD, Imagine a threat actor so determined to sound authentic, that they write hundreds of blog posts just to get your attention. Now imagine the author (or more than one) hosting those blogs to a legitimate site that translates them into three different languages, then sends victims to a fake forum page with “helpful” links to catch victims to a well-conceived trap. Now imagine them boosting their search engine optimization results. In our latest report from Deepwatch’s Adversary Tactics and Intelligence (ATI) group we look at a technique where threat actors are compromising legitimate websites, creating fake blog posts, and using overlays to display a fake forum page over blog posts–all to snare government, legal, real estate, medical, and education victims with highly-targeted content. WHAT HAPPENED In late August, Deepwatch’s Adversary Tactics and Intelligence (ATI) group responded to a customer incident highly likely associated with Gootloader threat actors using the search engine optimization (SEO) poisoning technique. Our findings suggest the campaign may have foreign intelligence service influence through analysis of the blog post subjects. The threat actors used blog post titles that an individual would search for whose organization may be of interest to a foreign intelligence service e.g. “Confidentiality Agreement for Interpreters.” The Threat Intel Team discovered the threat actors highly likely created 192 blog posts on one site. The fake blog posts cover topics relevant to government, legal, healthcare, real estate, and education. Several blog posts are related to business and real estate transactions in US states like California, Washington, and Wisconsin; while others cover topics relevant to Australia, Canada, New Zealand, the United Kingdom, the United States, and other countries. You can read how Deepwatch approaches cyber threat intelligence here. WHY IT MATTERS Threat actors are becoming more sophisticated, and putting in an unusual amount of effort. Understanding how attacks like these work, allows you to consider gaps in your security posture or prepare employees for clever phishing techniques. Read the Full Report SUBSCRIBE TO THE DEEPWATCH INSIGHTS BLOG POST NAVIGATION Previous post Cyber Intel Brief: Sept 8 – 14, 2022 Next post Cyber Intel Brief: Sept 14 – 21, 2022 DENVER OFFICE & SOC 7800 East Union Avenue Suite 900 Denver, CO 80237 USA 855.303.3033 TAMPA OFFICE & SOC 4030 W Boy Scout Blvd. Suite 550 Tampa, FL 33607 USA 855.303.3033 info@deepwatch.com WHY DEEPWATCH * Squad Delivery Model * Deepwatch Platform * Deepwatch Secure Score * Deepwatch Labs SOLUTIONS * Managed Detection and Response (MDR) * MDR Essentials * MDR Enterprise * Endpoint Detection and Response (EDR) * Vulnerability Management (VM) * Firewall Management Solution COMPANY * About Us * Leadership * Careers * Contact RESOURCES * Resource Library * Insights Blog * Education Center * News * Events PARTNERS * Channel Partners * Technology Alliance Partners CONTACT * Let's Talk * Customer Login * Partner Login © Copyright 2022 Deepwatch incorporated Trust | Sitemap | Privacy Policy Opens in new window PDF Download Word Download Excel Download PowerPoint Download Document Download Explore your accessibility options close carousel