Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers,
Cybersecurity researchers have discovered a previously undocumented malware targeting Android devices that uses compromised WordPress sites as relays for its actual command-and-control (C2) servers for detection evasion.
The malware, codenamed Wpeeper, is an ELF binary that leverages the HTTPS protocol to secure its C2 communications.
« Wpeeper is a typical backdoor Trojan for Android
The malware, codenamed Wpeeper, is an ELF binary that leverages the HTTPS protocol to secure its C2 communications.
« Wpeeper is a typical backdoor Trojan for Android
,
Cybersecurity researchers have discovered a previously undocumented malware targeting Android devices that uses compromised WordPress sites as relays for its actual command-and-control (C2) servers for detection evasion.
The malware, codenamed Wpeeper, is an ELF binary that leverages the HTTPS protocol to secure its C2 communications.
« Wpeeper is a typical backdoor Trojan for Android
The malware, codenamed Wpeeper, is an ELF binary that leverages the HTTPS protocol to secure its C2 communications.
« Wpeeper is a typical backdoor Trojan for Android
, ,
https://thehackernews.com/2024/05/android-malware-wpeeper-uses.html