Security News > 2024 > May > Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
2024-05-01 13:41
Cybersecurity researchers have discovered a previously undocumented malware targeting Android devices that uses compromised WordPress sites as relays for its actual command-and-control (C2) servers for detection evasion. The malware, codenamed Wpeeper, is an ELF binary that leverages the HTTPS protocol to secure its C2 communications. "Wpeeper is a typical backdoor Trojan for Android
News URL
https://thehackernews.com/2024/05/android-malware-wpeeper-uses.html
Related news
- New Wpeeper Android malware hides behind hacked WordPress sites (source)
- Evasive Sign1 malware campaign infects 39,000 WordPress sites (source)
- Vultur banking malware for Android poses as McAfee Security app (source)
- DinodasRAT malware targets Linux servers in espionage campaign (source)
- SoumniBot malware exploits Android bugs to evade detection (source)
- New Brokewell malware takes over Android devices, steals data (source)
- Researchers sinkhole PlugX malware server with 2.5 million unique IPs (source)
- New 'Brokewell' Android Malware Spread Through Fake Browser Updates (source)
- Finland warns of Android malware attacks breaching bank accounts (source)
- Ebury botnet malware infected 400,000 Linux servers since 2009 (source)