• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
android malware wpeeper uses compromised wordpress sites to hide c2

Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers

You are here: Home / General Cyber Security News / Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
May 1, 2024

Cybersecurity scientists have identified a previously undocumented malware concentrating on Android equipment that employs compromised WordPress internet sites as relays for its real command-and-control (C2) servers for detection evasion.

The malware, codenamed Wpeeper, is an ELF binary that leverages the HTTPS protocol to safe its C2 communications.

“Wpeeper is a standard backdoor Trojan for Android units, supporting capabilities these types of as accumulating sensitive gadget facts, taking care of documents and directories, uploading and downloading, and executing commands,” researchers from the QiAnXin XLab staff claimed.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The ELF binary is embedded inside of a repackaged software that purports to be the UPtodown Application Store app for Android (package deal name “com.uptodown”), with the APK file performing as a supply vehicle for the backdoor in a method that evades detection.

Cybersecurity

The Chinese cybersecurity organization explained it learned the malware soon after it detected a Wpeeper artifact with zero detection on the VirusTotal platform on April 18, 2024. The marketing campaign is stated to have arrive to an abrupt end 4 times afterwards.

The use of the Uptodown App Retail store application for the campaign suggests an try to move off a respectable third-party application market and trick unsuspecting end users into putting in it. According to stats on Android-apk.org, the trojanized version of the app (5.92) has been downloaded 2,609 periods to day.

Android Malware

Wpeeper depends on a multi-tier C2 architecture that works by using infected WordPress websites as an middleman to obscure its genuine C2 servers. As many as 45 C2 servers have been identified as portion of the infrastructure, 9 of which are challenging-coded into the samples and are utilised to update the C2 list on the fly.

“These [hard-coded servers] are not C2s but C2 redirectors — their position is to ahead the bot’s requests to the genuine C2, aimed at shielding the precise C2 from detection,” the researchers explained.

Cybersecurity

This has also raised the probability that some of the hard-coded servers are immediately beneath their management, because there is a risk of losing access to the botnet ought to WordPress web page administrators get wind of the compromise and just take steps to appropriate it.

The instructions retrieved from the C2 server allow the malware to obtain system and file details, list of installed applications, update the C2 server, down load and execute extra payloads from the C2 server or an arbitrary URL, and self-delete alone.

The actual targets and scale of the campaign are presently mysterious, despite the fact that it can be suspected that the sneaky approach may well have been used to boost the set up numbers and then reveal the malware’s abilities.

To mitigate the risks posed by these kinds of malware, it is constantly suggested to install apps only from trustworthy resources, and scrutinize app testimonials and permissions prior to downloading them.

Observed this write-up interesting? Stick to us on Twitter  and LinkedIn to read much more special articles we submit.


Some areas of this short article are sourced from:
thehackernews.com

Previous Post: «everyone's an expert: how to empower your employees for cybersecurity Everyone’s an Expert: How to Empower Your Employees for Cybersecurity Success
Next Post: Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds bitcoin forensic analysis uncovers money laundering clusters and criminal proceeds»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.