Original Article Text

Click to Toggle View

New Wpeeper Android malware hides behind hacked WordPress sites. A new Android backdoor malware named 'Wpeeper' has been spotted in at least two unofficial app stores mimicking the Uptodown App Store, a popular third-party app store for Android devices with over 220 million downloads. Wpeeper stands out for its novel use of compromised WordPress sites to act as relays for its actual command and control (C2) servers, acting as an evasion mechanism. The Android malware was discovered on April 18, 2024, by QAX's XLab team while examining a previously unknown ELF file embedded into APKs (Android package files), which had zero detections on Virus Total. The analysts report that the activity ceased abruptly on April 22, presumably as part of a strategic decision to maintain a low profile and evade detection by security professionals and automated systems. Based on Google and Passive DNS data, XLab deduced that Wpeeper had already infected thousands of devices by the time of its discovery, but the actual scale of operations remains unknown. Abusing WordPress as a C2 Wpeeper's novel C2 communication system is structured to leverage compromised WordPress sites and intermediate relay points, obscuring the location and identity of its actual C2 servers. Any commands sent from the C2 to the bots are forwarded via those sites, and they are additionally AES encrypted and signed by an elliptic curve signature to prevent takeover by unauthorized third parties. Wpeeper can update its C2 servers dynamically through the reception of a related command, so if a WordPress site is cleaned, new relaying points on different sites can be sent out to the botnet. Using multiple compromised sites across different hosts and locations adds resilience to the C2 mechanism, making it hard to shut down the operation or even disrupt the data exchange on a single infected Android device. Malware capabilities Wpeeper's primary functionality revolves around stealing data, facilitated by its extensive set of commands featuring 13 distinct functions. The supported commands in the backdoor malware are: Since the operators of Wpeeper and the campaign's motives are unknown, it's not clear how the stolen data is used, but potential risks include account hijacking, network infiltration, intelligence collection, identity theft, and financial fraud. To avoid risks like Wpeeper, it is recommended that you only install applications from Android's official app store, Google Play, and ensure that the OS's built-in anti-malware tool, Play Protect, is active on your device.

Daily Brief Summary

MALWARE // New 'Wpeeper' Android Malware Utilizes Compromised WordPress Sites

A novel Android backdoor named Wpeeper has been detected in unofficial app stores, posing as Uptodown App Store.

Wpeeper uses hacked WordPress sites as relays for its command and control (C2) servers, concealing its actual network infrastructure.

Discovered by QAX's XLab on April 18, 2024, with no prior detections on Virus Total, the malware ceased activity on April 22 to likely avoid detection.

Analysis revealed thousands of devices were infected, but the full extent of the infection remains uncertain.

Wpeeper's communications are encrypted and can dynamically update its C2 server addresses to maintain operational security.

The malware's capabilities include stealing user data through 13 different commands, though the end use of this data is not clearly stated.

Recommendations include downloading apps only from Google Play and using Android's Play Protect to defend against malware like Wpeeper.