Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

GootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection

Posted on January 16, 2026January 16, 2026 By CWS

Jan 16, 2026Ravie LakshmananMalvertising / Risk Intelligence
The JavaScript (aka JScript) malware loader referred to as GootLoader has been noticed utilizing a malformed ZIP archive that is designed to sidestep detection efforts by concatenating anyplace from 500 to 1,000 archives.
“The actor creates a malformed archive as an anti-analysis method,” Expel safety researcher Aaron Walton stated in a report shared with The Hacker Information. “That’s, many unarchiving instruments should not in a position to constantly extract it, however one vital unarchiving device appears to work constantly and reliably: the default device constructed into Home windows techniques.”
This results in a situation the place the archive can’t be processed by instruments like WinRAR or 7-Zip, and, subsequently, prevents many automated workflows from analyzing the contents of the file. On the similar time, it may be opened by the default Home windows unarchiver, thereby guaranteeing that victims who fall sufferer to the social engineering scheme can extract and run the JavaScript malware.
GootLoader is often distributed by way of search engine marketing (search engine marketing) poisoning techniques or malvertising, concentrating on customers searching for authorized templates to take them to compromised WordPress websites internet hosting malicious ZIP archives. Like different loaders, it is designed to ship secondary payloads, together with ransomware. The malware has been detected within the wild since not less than 2020.

In late October 2025, malware campaigns propagating the malware resurfaced with new methods: leveraging customized WOFF2 fonts with glyph substitution to obfuscate filenames and exploiting the WordPress remark endpoint (“/wp-comments-post.php”) to ship the ZIP payloads when a person clicks a “Obtain” button on the location.
The newest findings from Expel spotlight continued evolution of the supply strategies, with the menace actors using extra refined obfuscation mechanisms to evade detection –

Concatenate collectively 500-1,000 archives to craft the malicious ZIP file
Truncate the archive’s finish of central listing (EOCD) document such that it misses two vital bytes from the anticipated construction, triggering parsing errors
Randomize values in non-critical fields, reminiscent of disk quantity and Variety of Disks, inflicting unarchiving instruments to anticipate a sequence of ZIP archives which can be non-existent

“The random variety of information concatenated collectively, and the randomized values in particular fields are a defense-evasion method referred to as ‘hashbusting,'” Walton defined.
“In observe, each person who downloads a ZIP file from GootLoader’s infrastructure will obtain a singular ZIP file, so searching for that hash in different environments is futile. The GootLoader developer makes use of hashbusting for the ZIP archive and for the JScript file contained within the archive.”
The assault chain primarily entails the supply of the ZIP archive as an XOR-encoded blob, which is decoded and repeatedly appended to itself on the client-side (i.e., on the sufferer’s browser) till it meets a set measurement, successfully bypassing safety controls designed to detect the transmission of a ZIP file.

As quickly because the downloaded ZIP archive is double-clicked by the sufferer, it would trigger Home windows’ default unarchiver to open the ZIP folder containing the JavaScript payload in File Explorer. Launching the JavaScript file, in flip, triggers its execution by way of “wscript.exe” from a brief folder, because the file contents weren’t explicitly extracted.
The JavaScript malware then creates a Home windows shortcut (LNK) file within the Startup folder to determine persistence, in the end executing a second JavaScript file utilizing cscript, spawning PowerShell instructions to take the an infection to the subsequent stage. In earlier GootLoader assaults, the PowerShell script is used to gather system info and obtain instructions from a distant server.
To counter the menace posed by GootLoader, organizations are suggested to think about blocking “wscript.exe” and “cscript.exe” from executing downloaded content material if not required and use a Group Coverage Object (GPO) to make sure that JavaScript information are opened in Notepad by default, as an alternative of executing them by way of “wscript.exe.”

The Hacker News Tags:Archives, Concatenated, Detection, Evade, Gootloader, Malware, ZIP

Post navigation

Previous Post: Windows 11 PCs Fail to Shut Down After January Security Update

Related Posts

Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection The Hacker News
Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion The Hacker News
Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security The Hacker News
New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT The Hacker News
New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack The Hacker News
The Blind Spot Fueling Payment Skimmer Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • GootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection
  • Windows 11 PCs Fail to Shut Down After January Security Update
  • Cloudflare Acquired Open-source Web Framework Astro to Supercharge Development
  • In Other News: FortiSIEM Flaw Exploited, Sean Plankey Renominated, Russia’s Polish Grid Attack
  • Monnai Raises $12 Million for Identity and Risk Data Infrastructure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • GootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection
  • Windows 11 PCs Fail to Shut Down After January Security Update
  • Cloudflare Acquired Open-source Web Framework Astro to Supercharge Development
  • In Other News: FortiSIEM Flaw Exploited, Sean Plankey Renominated, Russia’s Polish Grid Attack
  • Monnai Raises $12 Million for Identity and Risk Data Infrastructure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark