• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new "whiffy recon" malware triangulates infected device location via wi fi

New “Whiffy Recon” Malware Triangulates Infected Device Location via Wi-Fi Every Minute

You are here: Home / General Cyber Security News / New “Whiffy Recon” Malware Triangulates Infected Device Location via Wi-Fi Every Minute
August 24, 2023

The SmokeLoader malware is becoming applied to supply a new Wi-Fi scanning malware pressure identified as Whiffy Recon on compromised Windows machines.

“The new malware pressure has only a single operation. Every single 60 seconds it triangulates the infected systems’ positions by scanning close by Wi-Fi access points as a info issue for Google’s geolocation API,” Secureworks Counter Threat Device (CTU) explained in a assertion shared with The Hacker Information. “The location returned by Google’s Geolocation API is then sent back to the adversary.”

SmokeLoader, as the name implies, is a loader malware whose sole purpose is to fall further payloads onto a host. Due to the fact 2014, the malware has been provided for sale to Russian-dependent danger actors. It is historically dispersed through phishing e-mail.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

Whiffy Recon is effective by examining for the WLAN AutoConfig company (WLANSVC) on the contaminated program and terminating by itself if the service name will not exist. It really is really worth noting that the scanner does not validate if it’s operational.

Persistence is realized by means of a shortcut that is added to the Windows Startup folder.

Location Malware

“What is regarding about our discovery of Whiffy Recon is the commitment for its operation is unclear,” Don Smith, VP Menace Intelligence Secureworks CTU claimed.

“Who, or what, is interested in the true spot of an infected device? The regularity of the scan at every single 60 seconds is unusual, why update each and every minute? With this variety of info a danger actor could variety a photo of the geolocation of a gadget, mapping the electronic to the physical.”

Cybersecurity

The malware is also configured to sign-up with a distant command-and-control (C2) server by passing together a randomly created “botID” in an HTTP Article ask for, subsequent which the server responds with a success message and a top secret unique determined that’s subsequently saved in a file named “%APPDATA%Roamingwlanstr-12.bin.”

The next section of the attack entails scanning for Wi-Fi obtain details by using the Windows WLAN API each 60 seconds. The effects of the scan are forwarded to the Google Geolocation API to triangulate the system’s whereabouts and ultimately transmit that information to the C2 server in the sort of a JSON string.

“This form of exercise/ability is very hardly ever utilized by legal actors,” Smit additional. “As a standalone ability it lacks the skill to immediately monetise. The unknowns below are stressing and the fact is that it could be utilized to help any variety of nefarious motivations.”

Uncovered this article appealing? Follow us on Twitter  and LinkedIn to read through far more special content material we publish.


Some elements of this short article are sourced from:
thehackernews.com

Previous Post: «winrar security flaw exploited in zero day attacks to target traders WinRAR Security Flaw Exploited in Zero-Day Attacks to Target Traders
Next Post: The Hidden Dangers of Public Wi-Fi the hidden dangers of public wi fi»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New FjordPhantom Android Malware Targets Banking Apps in Southeast Asia
  • Qakbot Takedown Aftermath: Mitigations and Protecting Against Future Threats
  • Chinese Hackers Using SugarGh0st RAT to Target South Korea and Uzbekistan
  • Discover How Gcore Thwarted Powerful 1.1Tbps and 1.6Tbps DDoS Attacks
  • WhatsApp’s New Secret Code Feature Lets Users Protect Private Chats with Password
  • U.S. Treasury Sanctions North Korean Kimsuky Hackers and 8 Foreign Agents
  • Zyxel Releases Patches to Fix 15 Flaws in NAS, Firewall, and AP Devices
  • Zero-Day Alert: Apple Rolls Out iOS, macOS, and Safari Patches for 2 Actively Exploited Flaws
  • Google Unveils RETVec – Gmail’s New Defense Against Spam and Malicious Emails
  • North Korea’s Lazarus Group Rakes in $3 Billion from Cryptocurrency Hacks

Copyright © TheCyberSecurity.News, All Rights Reserved.