Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Linus Torvalds Says AI Bug Reports Have Made Linux Security
May 18, 2026
Malicious npm Packages Steal SSH, Cloud & Crypto Four Keys
May 18, 2026
CISA Warns: Microsoft Exchange Vulnerability Exploited
May 18, 2026
Home/Threats/GuLoader Evades Defenses Using Polymorphic Code & Cloud
Threats

GuLoader Evades Defenses Using Polymorphic Code & Cloud

GuLoader, also known by its alias CloudEyE, has firmly established itself as a persistent and evolving threat within the cybersecurity landscape. Since its initial appearance, this sophisticated...

David kimber
David kimber
February 10, 2026 3 Min Read
7 0

GuLoader, also known by its alias CloudEyE, has firmly established itself as a persistent and evolving threat within the cybersecurity landscape. Since its initial appearance, this sophisticated malware has consistently challenged defensive measures, making it a critical concern for security professionals.

Primarily functioning as a sophisticated downloader, it is designed to retrieve and execute secondary malware payloads, such as the Remcos Remote Access Trojan (RAT) and information stealers like Vidar and Raccoon Stealer.

This malware has garnered significant attention due to its advanced capabilities in bypassing security filters and its widespread use by threat actors seeking to compromise organizational networks for data theft and surveillance operations.

The infection process typically commences with a malicious spam email containing an archive attachment, such as a ZIP or ISO file.

These archives conceal the initial loader, often in the form of a VBScript or an NSIS installer, which masquerades as a legitimate business document or invoice.

Upon execution, the script initiates a multi-stage attack sequence that downloads the encrypted shellcode.

This shellcode is responsible for preparing the victim’s system and retrieving the final malicious payload from a remote server to complete the infection chain.

Zscaler analysts identified the latest GuLoader version have adopted sophisticated strategies to evade detection by modern security solutions.

The researchers noted that the malware now heavily utilizes trusted cloud hosting platforms, including Google Drive and Microsoft OneDrive, to store its encrypted payloads.

By leveraging these reputable services, the attackers ensure that the network traffic generated during the download phase appears legitimate, thereby bypassing reputation-based blocking mechanisms that would typically flag connections to unknown or malicious domains.

This strategic shift to cloud-based infrastructure provides the attackers with resilient hosting that is difficult to blacklist without disrupting essential business operations.

The encrypted nature of the payloads further complicates network-based detection, as the content cannot be inspected without decryption.

This combination of trusted hosting and encryption creates a formidable challenge for defenders relying on domain reputation and traffic analysis alone to protect their environments.

Polymorphic Code Evasion

A critical advancement in GuLoader’s arsenal is its use of polymorphic code to neutralize static analysis and signature-based detection.

Example of a GuLoader function utilizing polymorphic code (Source - Zscaler)
Example of a GuLoader function utilizing polymorphic code (Source – Zscaler)

Rather than embedding static constants, the malware dynamically generates these values at runtime using a complex series of randomized arithmetic operations.

Operations that GuLoader uses to dynamically construct constant values during execution (Source - Zscaler)
Operations that GuLoader uses to dynamically construct constant values during execution (Source – Zscaler)

Here the instructions such as XOR, ADD, and SUB are combined to calculate the necessary data on the fly, ensuring that the code structure changes with every execution.

This polymorphism effectively renders traditional antivirus signatures obsolete.

Additionally, the malware incorporates extensive anti-analysis techniques, including the scanning of process memory for virtualization artifacts to detect sandboxes and the use of vector exception handlers to disrupt debugging efforts.

Demonstrates version 2022 of GuLoader’s use of an int 3 instruction to trigger a software interrupt (Source - Zscaler)
Demonstrates version 2022 of GuLoader’s use of an int 3 instruction to trigger a software interrupt (Source – Zscaler)

Organizations should implement comprehensive email filtering to block malicious attachments and restrict the execution of VBScript and NSIS files.

Enabling SSL inspection allows for the detection of malicious content within encrypted traffic to cloud services.

Furthermore, deploying behavior-based endpoint detection and response (EDR) solutions can help identify and terminate the malware’s anomalous activities during the execution phase.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityMalwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

AI Chat App Exposes 300 Million Messages from 25 Million Users

Next Post

Threat Actor Leaks WormGPT Database: Cybercrime AI

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Windows ‘MiniPlasma’ Zero-Day Grants SYSTEM Access
May 18, 2026
Critical WordPress Plugin Flaw Allows Authentication Bypass Attacks
May 18, 2026
Fast16 Malware Sabotaged Nuclear Weapons Simulation Data
May 18, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us