Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Wpeeper Android Trojan Uses Compromised WordPress Sites to Shield Command-and-Control Server

The new Wpeeper Android trojan ceased operations after a week and has zero detections in VirusTotal.

Android security

Chinese cybersecurity firm QAX XLab has uncovered a new Android trojan that hides its true command-and-control (C&C) server behind a series of compromised WordPress sites.

Dubbed Wpeeper, the malware has the typical functionality of an Android trojan, such as information collection, file and directory management, file download and upload, and command execution.

However, the malware stands out due to its use of a multi-level C&C infrastructure, where hacked WordPress websites are used to redirect communication to the real C&C server.

Furthermore, QAX XLab says, the malware uses HTTPS for communication, encrypts commands and uses an elliptic signature to prevent their takeover, and uses the Session field to differentiate requests.

A sample of the trojan was initially uploaded to VirusTotal on April 17, but its activity abruptly ceased on April 22, when the malware received a command to delete itself.

In that timeframe, however, QAX XLab identified dozens of C&C domains associated with the threat, which was being distributed via repackaged applications in the third-party Android application store UPtodown Store, which served as downloaders.

“The final command, with function number 12, was to delete itself. Initially, we thought our command tracking had been exposed, but changing tracking IPs proved ineffective; subsequently, the downloader also ceased providing sample downloads. The entire campaign seemed to have been abruptly halted,” QAX XLab notes.

Because the APKs fetching Wpeeper were not flagged as malicious, the abrupt halt in activity could suggest that the threat actor may be waiting for the downloaders to gain more popularity before pushing the trojan to user devices again.

Advertisement. Scroll to continue reading.

According to QAX XLab, the malware has likely infected at least several thousands of devices, with the repackaged APKs continuing to be downloaded.

Before its abrupt disappearance, Wpeeper was seen using 45 C&C servers, most of which begin compromised WordPress sites acting as redirectors, forwarding bot requests, and hiding the real C&C.

The malware includes a list of hardcoded C&Cs, with at least one of them being a server operated by the attackers.

“The encryption, signature verification, C2 Redirectors, and other mechanisms employed by Wpeeper all reflect the creators’ professional proficiency. Even its current mysterious ‘silence’ could likely be part of their attack strategy, aiming to enter the AI learning sample set of antivirus software as a trusted entity,” QAX XLab said.

Related: Powerful ‘Brokewell’ Android Trojan Allows Attackers to Takeover Devices

Related: ‘Vultur’ Android Malware Gets Extensive Device Interaction Capabilities

Related: Anatsa Android Banking Trojan Continues to Spread via Google Play

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

OT zero trust access and control company Dispel has appointed Dean Macris as its CISO.

Cloud identity and security solutions firm Saviynt has hired former Gartner Analyst Henrique Teixeira as Senior Vice President of Strategy.

PR and marketing firm FleishmanHillard named Scott Radcliffe as the agency's global director of cybersecurity.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.