Gootloader malware returns with fake NDA scam – here’s what we know


  • Gootloader malware is resurfacing using malvertising and SEO poisoning to spread infections
  • Attackers are now obfuscating malware names using deceptive web fonts and glyph swapping
  • Loader delivers ransomware, infostealers and Cobalt Strike via compromised search results

The Gootloader malware scam, which was thought to have been disrupted and shut down in March 2025, has returned with both old and new tricks, experts have warned.

Gootloader is known to use malvertising and SEO poisoning to distribute the malware. Cybercriminals would either create websites or infiltrate legitimate websites and rearrange them to host different documents, such as NDA templates. Then they would buy ads on popular ad networks or engage in SEO poisoning – creating countless web articles and stuffing them with keywords that link back to the sites under their control.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top