Gootloader infection cleaned up

Dear blog owner and visitors,

This blog had been infected to serve up Gootloader malware to Google search victims, via a common tactic known as SEO (Search Engine Optimization) poisioning. Your blog was serving up 61 malicious pages. Your blogged served up malware to 0 visitors.

I tried my best to clean up the infection, but I would do the following:

  • Upgrade WordPress to the latest version (one way the attackers might have gained access to your server)
  • Upgrade all WordPress themes to the latest versions (another way the attackers might have gained access to your server)
  • Upgrade all WordPress plugins (another way the attackers might have gained access to your server), and remove any unnecessary plugins.
  • Verify all users are valid (in case the attackers left a backup account, to get back in)
  • Change all passwords (for WordPress accounts, FTP, SSH, database, etc.) and keys. This is probably how the attackers got in, as they are known to brute force weak passwords
  • Run antivirus scans on your server
  • Block these IPs (5.8.18.7 and 89.238.176.151), either in your firewall, .htaccess file, or in your /etc/hosts file, as these are the attackers command and control servers, which send malicious commands for your blog to execute
  • Check cronjobs (both server and WordPress), aka scheduled tasks. This is a common method that an attacker will use to get back in. If you are not sure, what this is, Google it
  • Consider wiping the server completly, as you do not know how deep the infection is. If you decide not to, I recommend installing some security plugins for WordPress, to try and scan for any remaining malicious files. Integrity Checker, WordPress Core Integrity Checker, Sucuri Security,
    and Wordfence Security, all do some level of detection, but not 100% guaranteed
  • Go through the process for Google to recrawl your site, to remove the malcious links (to see what malicious pages there were, Go to Google and search site:your_site.com agreement)
  • Check subdomains, to see if they were infected as well
  • Check file permissions

Gootloader (previously Gootkit) malware has been around since 2014, and is used to initally infect a system, and then sell that access off to other attackers, who then usually deploy additional malware, to include ransomware and banking trojans. By cleaning up your blog, it will make a dent in how they infect victims. PLEASE try to keep it up-to-date and secure, so this does not happen again.

Sincerly,

The Internet Janitor

Below are some links to research/further explaination on Gootloader:

https://news.sophos.com/en-us/2021/03/01/gootloader-expands-its-payload-delivery-options/

https://news.sophos.com/en-us/2021/08/12/gootloaders-mothership-controls-malicious-content/

https://www.richinfante.com/2020/04/12/reverse-engineering-dolly-wordpress-malware

https://blog.sucuri.net/2018/12/clever-seo-spam-injection.html

This message

One Response to “Gootloader infection cleaned up”

  1. bngvcllbzj says:

    倚天2完美世界征服一条龙www.45ur.com776356990@qq.com洛汗天之炼狱一条龙

    美丽世界开服乱勇OL开服倚天2开服完美世界开服征服开服
    天堂开服传世开服真封神开服劲舞团开服天上碑开服
    永恒之塔开服仙境RO开服诛仙开服神泣开服石器开服
    冒险岛开服惊天动地开服热血江湖开服问道开服密传开服
    天龙开服奇迹Mu开服魔兽开服魔域开服墨香开服
    天堂2开服传奇3开服英雄王座开服千年开服征途开服
    新魔界开服骑士开服烈焰开服破天开服决战开服
    火线任务(Heat Project)开服飞飞OL开服洛汗开服天之炼狱开服
    丝路传说开服大话西游开服蜀门开服机战开服剑侠情缘开服
    绝对女神开服传说OL开服刀剑开服弹弹堂开服科洛斯开服
    魔力宝贝开服武林外传开服网页游戏开服页游开服希望OL开服
    成吉思汗开服剑侠世界开服全民奇迹开服挑战OL开服
    红月开服十二之天(江湖OL)开服倚天开服dnf开服
    ————————————————————————————————
    GM除了可以在自己开的服里畅快的玩,还可以获取玩家充值而得大赚一笔!同样的价格,我们比质量;同样的质量,我们比服务;同样的服务,我们比信誉!我们的服务,帮助您走向锦绣的前程,品质源于竭力提供放心,安心,称心!想开个好F就来,想要服务器不卡就来!主营业务:手游端游页游服务端版本一条龙开服+服务器租用+网站建设修改+广告宣传渠道

Leave a Reply