Client Advisory: GootLoader attacks on legal services
The CFC Incident Response Team has recently seen several ransomware attacks on legal services firms which appear to have been caused by GootLoader malware.
To achieve the infection of a system, GootLoader hijacks Google search rankings to promote attacker-controlled websites further up in Google’s search index.
For example, typing the question, "the Canadian inter-company arbitration agreement" into Google presents this result for the attacker-controlled site on the first page:
The website is for a marketing organization, which would not have anything to do with the search term. Clicking the webpage takes to you this forum post:
The CFC Incident Response team has seen law firms’ websites which have been compromised to enable the distribution of GootLoader to other law firms visiting the compromised site. This is what is known as a watering hole attack.
What should you look out for?
We recommend sense-checking before downloading any file from the internet, but in recognition of this attack specifically you should ask yourself:
- Does the website topic seem to match the exact nature of your search term? In the example above, our search term was about a legal agreement but the website provided belonged to a marketing firm.
- Does the website require you to download the answer to your query? Attackers try to utilise compromised websites to encourage you to download malicious files.
- Does the page make grammatical sense? These pages are engineered to match your specific search term to encourage you to download the file, but don’t always make sense.
How can I protect my organization from these types of attacks?
- Ensure anti-virus and anti-malware solutions are set to automatically update and that regular scans are conducted.
- Ensure all operating systems and software applications are kept up-to-date and, where possible, have this done automatically.
- Consider investing in a secure web gateway to detect potentially malicious websites.
- Utilise device management tools to only allow trusted applications to run on devices, preventing users from running malicious executables.
- Ensure your users receive awareness training to decrease vulnerability to targeted attacks.