Whiffy Recon Malware: Smoke Loader Botnet’s New Weapon for Location Tracking via WiFi

by | Aug 25, 2023 | News

Premium Content

Patreon

Subscribe to Patreon to watch this episode.

Reading Time: 3 Minutes

Cybercriminals linked to the notorious Smoke Loader botnet have rolled out a fresh piece of malware named Whiffy Recon, designed to pinpoint the geographical location of compromised devices through a combination of WiFi scanning and Google’s geolocation API.

At the heart of this tactic is Google’s geolocation API, a service that processes HTTPS requests containing WiFi access point details to provide precise latitude and longitude coordinates, effectively locating devices that lack GPS capabilities.

Smoke Loader, a modular malware dropper with a history spanning several years, has predominantly been utilized in the initial stages of attacks to deliver subsequent payloads.

Whiffy Recon, the latest addition to Smoke Loader’s arsenal, takes a different approach by leveraging location information to potentially fine-tune attacks, focusing on specific regions or even urban environments. Moreover, displaying the capability to track victims’ locations could serve as an intimidation tactic.

See Also: So you want to be a hacker?
Offensive Security, Bug Bounty Courses

The precision of triangulation using Google’s geolocation API varies based on the density of WiFi access points in the vicinity. In more densely populated areas, the accuracy ranges between 20 to 50 meters (65 to 165 feet), while it might be slightly less accurate in sparser regions.

 

Whiffy Recon’s operation involves the following steps:

  1. The malware checks for the presence of the ‘WLANSVC’ service.
  2. If the service is absent, the bot registers itself with the command and control (C2) server, skipping WiFi scanning.

    Whiffy Recon main functionWhiffy Recon main function (Secureworks)

  3. For systems with the ‘WLANSVC’ service, the malware enters a WiFi scanning loop, collecting WiFi access point data via the Windows WLAN API.
  4. The collected data is sent to Google’s geolocation API through HTTPS POST requests in JSON format.
  5. Google’s response provides the coordinates, which the malware uses to generate a comprehensive report about the access points.
  6. This report, including geographic positions, encryption methods, and SSIDs, is sent to the C2 as a JSON POST request.

    Complete victim profile sent to the C2Complete victim profile sent to the C2 (Secureworks)

  7. This process repeats every 60 seconds, potentially enabling near-real-time tracking of compromised devices.

Security researchers at Secureworks, who discovered Whiffy Recon on August 8, speculate that the obtained geolocation data could be wielded as a means of pressuring victims to comply with attackers’ demands, adding an element of intimidation to the attacks.

Interestingly, the malware version indicated in the initial POST request to the C2 is “1,” hinting at the early development stage of the malware and the possibility of further refinements or enhancements by the authors.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This