Skip to main content

Proton66: Compromised WordPress Pages and Malware Campaigns

Medium
Published: Fri Apr 18 2025 (04/18/2025, 08:11:58 UTC)
Source: AlienVault OTX

Description

This intelligence briefing focuses on malware campaigns linked to Proton66, particularly those targeting Android devices through compromised WordPress websites. It details how these sites were injected with malicious scripts to redirect Android users to fake Google Play Store pages. The report also covers the XWorm campaign targeting Korean-speaking users, the Strela Stealer targeting German-speaking countries, and the WeaXor ransomware. The analysis provides insights into the infection chains, malware configurations, and command-and-control servers used in these campaigns. Additionally, it offers recommendations for blocking associated IP ranges and lists numerous indicators of compromise (IOCs) for each campaign.

AI-Powered Analysis

AILast updated: 06/19/2025, 17:48:27 UTC

Technical Analysis

The Proton66 threat encompasses a series of malware campaigns primarily leveraging compromised WordPress websites to target Android users. Attackers inject malicious scripts into vulnerable WordPress pages, which then redirect Android visitors to counterfeit Google Play Store pages designed to distribute malware. This infection vector exploits the widespread use of WordPress as a content management system and the trust users place in Google Play Store interfaces. The campaigns include multiple malware families: XWorm, which targets Korean-speaking users and is known for remote access trojan (RAT) capabilities; Strela Stealer, focusing on German-speaking countries, designed to exfiltrate sensitive information such as credentials and financial data; and WeaXor ransomware, which encrypts victim data to demand ransom payments. The analysis of these campaigns reveals complex infection chains involving initial redirection, payload delivery, and command-and-control (C2) communications. Malware configurations are tailored to regional targets, indicating a strategic approach by Proton66. The campaigns also utilize specific IP ranges for C2 servers, which can be blocked to disrupt operations. While no known exploits are actively used to compromise WordPress sites, the injection of malicious scripts suggests exploitation of vulnerabilities or weak administrative controls. The campaigns demonstrate a multi-faceted approach combining phishing, malware distribution, and ransomware deployment, with a focus on Android platforms and regional targeting based on language and geography.

Potential Impact

European organizations face several risks from Proton66 campaigns. The Strela Stealer's targeting of German-speaking countries implies a direct threat to Germany, Austria, and parts of Switzerland, potentially compromising corporate credentials, financial information, and personal data, leading to financial loss and reputational damage. The use of compromised WordPress sites as infection vectors threatens any organization relying on WordPress for their web presence, risking website defacement, data leakage, and distribution of malware to visitors. Android users within European organizations are at risk of malware infection through fake app stores, which can lead to device compromise, unauthorized access to corporate networks, and lateral movement. The presence of WeaXor ransomware introduces the risk of data encryption and operational disruption, with potential ransom payments and recovery costs. Given the regional focus on German-speaking users and the broader targeting of Android platforms, organizations in Europe with significant Android device usage and WordPress-based infrastructure are particularly vulnerable. The campaigns' use of phishing and social engineering further increases the likelihood of successful infections, especially if user awareness is low.

Mitigation Recommendations

1. Conduct thorough security audits of all WordPress installations, including plugins and themes, to identify and remediate vulnerabilities or unauthorized script injections. 2. Implement strict access controls and multi-factor authentication for WordPress administrative accounts to prevent unauthorized modifications. 3. Regularly monitor website content and traffic for unusual redirects or script injections using automated scanning tools specialized in CMS security. 4. Block known Proton66-associated IP ranges at network perimeter firewalls and intrusion prevention systems to disrupt C2 communications. 5. Educate employees and users about the risks of fake app stores and phishing campaigns, emphasizing verification of app sources and cautious behavior on mobile devices. 6. Deploy mobile device management (MDM) solutions to enforce security policies on Android devices, including restrictions on app installations from unknown sources. 7. Maintain up-to-date backups of critical data and test restoration procedures to mitigate ransomware impact. 8. Utilize endpoint detection and response (EDR) tools capable of identifying behaviors associated with XWorm, Strela Stealer, and WeaXor malware. 9. Collaborate with threat intelligence providers to stay informed on emerging indicators of compromise and adapt defenses accordingly. 10. For organizations with German-speaking user bases, prioritize monitoring for Strela Stealer activity and tailor incident response plans to address potential data exfiltration scenarios.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://trustwave.com/en-us/resources/blogs/spiderlabs-blog/proton66-part-2-compromised-wordpress-pages-and-malware-campaigns"]
Adversary
Proton66

Indicators of Compromise

Hash

ValueDescriptionCopy
hash4c74caa9c0eeb2c7637da9bbde9535d7
hasha087e994db776a0c657e45d315851186
hasha74ee50d2f91f77f010ecb154aa6b30b
hashaf2fe7b209912ec3a345fd8169fde338
hash61bff81cd5475552c73e0745d629b9265b84cb8c
hash90138ac54f4002803b7a88137da5ed2c5e46460c
hasha10d8e59c8ea698349c073df06d509e958cd3333
hashc7207893a06a56f8f682e33fd32dc04700885317
hash2d2bc95183f58a5e7fe9997b092120d6bfa18ed7ccb4f70b1af1b066ea16a1c3
hash40b75aa3c781f89d55ebff1784ff7419083210e01379bea4f5ef7e05a8609c38
hash4db2fa8e019cf499b8e08e7d036b68926309905eb1d6bb3d5466e551ac8d052e
hash7d1de2f4ab7c35b53154dc490ad3e7ad19ff04cfaa10b1828beba1ffadbaf1ab
hash7f2319f4e340b3877e34d5a06e09365f6356de5706e7a78e367934b8a58ed0e7
hash91811e7a269be50ad03632e66a4a6e6b17b5b9b6d043b5ac5da16d5021de8ddb
hash956934581dfdba96d69b77b14f6ab3228705862b2bd189cd98d6bfb9565d9570
hash99016e8ca8a72da67264019970ab831064ecc1f10591c90ea3a2e1db530188ee
hash9b93daf047b9010bf4e87ca71ae5aefae660820833c15877a9105215af0745cd
hasha2f0e6f9c5058085eac1c9e7a8b2060b38fd8dbdcba2981283a5e224f346e147
hashd682d5afbbbd9689d5f30db8576b02962af3c733bd01b8f220ff344a9c00abfd
hashe55b6664c77a9f3a98b32f46a20c2e392dcc7f1717fb69447e4e4229c7b6985d
hashe780d314ae6f9bf9d227df004a3c19ab7f3042e583d333f12022ef777ba9600a

Url

ValueDescriptionCopy
urlhttp://193.143.1.139/Ujdu8jjooue/biweax.php
urlhttp://my-tasjeel-ae.com/droid.js
urlhttp://my-tasjeel-ae.com/getfr.js
urlhttp://my-tasjeel-ae.com/getid.js
urlhttp://whitelabeliq.com/
urlhttp://www-kodi.com/download.php
urlhttp://www-kodi.com/droid.js
urlhttp://www-kodi.com/getfr.js
urlhttp://www-kodi.com/getgr.js
urlhttp://www-kodi.com/getupd.js
urlhttp://www-wpx.net/assets/core.js
urlhttp://www-wpx.net/kodi-21.1-Omega-x64.msi

Domain

ValueDescriptionCopy
domaincompetitivewindscreens.com.au
domaineducation-ethologique.fr
domainembajadaguatemala.es
domaingr-playmarkets.com
domainiconichomestudios.com
domainlemasdessalettes.com
domainmikkiwaxbar.co.uk
domainmy-tasjeel-ae.com
domainplaystore-fr.com
domainplaystore-spain.com
domainplaystores-france.com
domainplaystors-france.com
domainplaystors-gr.com
domainspain-playmarket.com
domainspain-playstores.com
domainupdatestore-spain.com
domainus-playmarket.com

Threat ID: 682c992c7960f6956616a125

Added to database: 5/20/2025, 3:01:00 PM

Last enriched: 6/19/2025, 5:48:27 PM

Last updated: 8/17/2025, 4:54:22 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats