🔴 HIGHmalware

Gootloader Ransomware Loader - Vanilla Tempest Hits Domain Controllers

Gootloader ransomware loader activity has resurged after a period of relative quiet, with new campaigns quickly handing compromised environments to Vanilla Tempest (Rhysida) operators. Gootloader ransomware loader infections tracked by Huntress since late October show three recent compromises, two of which led to hands-on-keyboard intrusions and domain controller takeover in as little as 17 hours. Storm-0494 operators run the Gootloader initial access operation, while Vanilla Tempest manages post-exploitation and ransomware deployment. Gootloader ransomware loader campaigns rely heavily on search engine optimization poisoning and compromised WordPress sites. Victims searching for legal or business templates encounter booby-trapped pages that abuse WordPress comment endpoints to hide encrypted payloads. When users download seemingly harmless ZIP archives, they execute malicious JavaScript that establishes persistence, drops the Supper SOCKS5 backdoor, and sets the stage for lateral movement. Recent campaigns even embed custom WOFF2 fonts that obfuscate filenames, making malicious content appear benign in the browser while remaining unreadable in source code. For enterprise defenders, Gootloader ransomware loader operations represent a fast-moving intrusion chain that can pivot from a single endpoint compromise to domain-wide impact within a business day. Organizations that depend on distributed Windows infrastructure and loosely controlled internet browsing from workstations need layered defenses that detect malicious JavaScript execution, unusual outbound connections, and Supper backdoor indicators long before ransomware binaries appear.

🎯CORTEX Protocol Intelligence Assessment

Business Impact: Gootloader ransomware loader campaigns feeding Vanilla Tempest give adversaries a streamlined assembly line from initial access to ransomware-ready control over domain controllers. Small and mid-sized organizations that lack strong segmentation and privileged access controls are particularly at risk of full-environment encryption, business interruption, and data theft following what appears initially as a single user’s bad download. Technical Context: Gootloader ransomware loader intrusions combine SEO poisoning, compromised WordPress sites, encrypted JavaScript payloads, and persistence through the Supper SOCKS5 backdoor. Vanilla Tempest then uses tools such as Windows Remote Management and Impacket to move laterally, inventory backups, and stage ransomware deployment. Defenders should prioritize detection of suspicious JavaScript from untrusted ZIP archives, Supper-related artifacts, and rapid privilege escalation events leading toward domain controllers.

Strategic Intelligence Guidance

  • Restrict execution of JavaScript from user-download locations using application control policies and script-blocking where feasible on high-risk endpoints.
  • Deploy DNS and web-filtering controls to block access to known Gootloader infrastructure and rapidly flag newly compromised WordPress domains serving suspicious archives.
  • Implement strong administrative tiering and just-in-time access models that prevent single workstations from being stepping stones to domain controller compromise.
  • Integrate Supper backdoor and Vanilla Tempest indicators from current threat reports into SOC hunting routines, emphasizing time-to-domain-controller metrics in incident reviews.

Vendors

Huntress

Threats

GootloaderVanilla TempestRhysida ransomwareSupper backdoor

Targets

Windows domainsSMB environmentsCompromised WordPress sites