Proton66: Compromised WordPress Pages and Malware Campaigns
This intelligence briefing focuses on malware campaigns linked to Proton66, particularly those targeting Android devices through compromised WordPress websites. It details how these sites were injected with malicious scripts to redirect Android users to fake Google Play Store pages. The report also covers the XWorm campaign targeting Korean-speaking users, the Strela Stealer targeting German-speaking countries, and the WeaXor ransomware. The analysis provides insights into the infection chains, malware configurations, and command-and-control servers used in these campaigns. Additionally, it offers recommendations for blocking associated IP ranges and lists numerous indicators of compromise (IOCs) for each campaign.
AI Analysis
Technical Summary
The Proton66 threat encompasses a series of malware campaigns primarily leveraging compromised WordPress websites to target Android users. Attackers inject malicious scripts into vulnerable WordPress pages, which then redirect Android visitors to counterfeit Google Play Store pages designed to distribute malware. This infection vector exploits the widespread use of WordPress as a content management system and the trust users place in Google Play Store interfaces. The campaigns include multiple malware families: XWorm, which targets Korean-speaking users and is known for remote access trojan (RAT) capabilities; Strela Stealer, focusing on German-speaking countries, designed to exfiltrate sensitive information such as credentials and financial data; and WeaXor ransomware, which encrypts victim data to demand ransom payments. The analysis of these campaigns reveals complex infection chains involving initial redirection, payload delivery, and command-and-control (C2) communications. Malware configurations are tailored to regional targets, indicating a strategic approach by Proton66. The campaigns also utilize specific IP ranges for C2 servers, which can be blocked to disrupt operations. While no known exploits are actively used to compromise WordPress sites, the injection of malicious scripts suggests exploitation of vulnerabilities or weak administrative controls. The campaigns demonstrate a multi-faceted approach combining phishing, malware distribution, and ransomware deployment, with a focus on Android platforms and regional targeting based on language and geography.
Potential Impact
European organizations face several risks from Proton66 campaigns. The Strela Stealer's targeting of German-speaking countries implies a direct threat to Germany, Austria, and parts of Switzerland, potentially compromising corporate credentials, financial information, and personal data, leading to financial loss and reputational damage. The use of compromised WordPress sites as infection vectors threatens any organization relying on WordPress for their web presence, risking website defacement, data leakage, and distribution of malware to visitors. Android users within European organizations are at risk of malware infection through fake app stores, which can lead to device compromise, unauthorized access to corporate networks, and lateral movement. The presence of WeaXor ransomware introduces the risk of data encryption and operational disruption, with potential ransom payments and recovery costs. Given the regional focus on German-speaking users and the broader targeting of Android platforms, organizations in Europe with significant Android device usage and WordPress-based infrastructure are particularly vulnerable. The campaigns' use of phishing and social engineering further increases the likelihood of successful infections, especially if user awareness is low.
Mitigation Recommendations
1. Conduct thorough security audits of all WordPress installations, including plugins and themes, to identify and remediate vulnerabilities or unauthorized script injections. 2. Implement strict access controls and multi-factor authentication for WordPress administrative accounts to prevent unauthorized modifications. 3. Regularly monitor website content and traffic for unusual redirects or script injections using automated scanning tools specialized in CMS security. 4. Block known Proton66-associated IP ranges at network perimeter firewalls and intrusion prevention systems to disrupt C2 communications. 5. Educate employees and users about the risks of fake app stores and phishing campaigns, emphasizing verification of app sources and cautious behavior on mobile devices. 6. Deploy mobile device management (MDM) solutions to enforce security policies on Android devices, including restrictions on app installations from unknown sources. 7. Maintain up-to-date backups of critical data and test restoration procedures to mitigate ransomware impact. 8. Utilize endpoint detection and response (EDR) tools capable of identifying behaviors associated with XWorm, Strela Stealer, and WeaXor malware. 9. Collaborate with threat intelligence providers to stay informed on emerging indicators of compromise and adapt defenses accordingly. 10. For organizations with German-speaking user bases, prioritize monitoring for Strela Stealer activity and tailor incident response plans to address potential data exfiltration scenarios.
Affected Countries
Germany, Austria, Switzerland, France, Netherlands, Belgium, United Kingdom
Indicators of Compromise
- hash: 4c74caa9c0eeb2c7637da9bbde9535d7
- hash: a087e994db776a0c657e45d315851186
- hash: a74ee50d2f91f77f010ecb154aa6b30b
- hash: af2fe7b209912ec3a345fd8169fde338
- hash: 61bff81cd5475552c73e0745d629b9265b84cb8c
- hash: 90138ac54f4002803b7a88137da5ed2c5e46460c
- hash: a10d8e59c8ea698349c073df06d509e958cd3333
- hash: c7207893a06a56f8f682e33fd32dc04700885317
- hash: 2d2bc95183f58a5e7fe9997b092120d6bfa18ed7ccb4f70b1af1b066ea16a1c3
- hash: 40b75aa3c781f89d55ebff1784ff7419083210e01379bea4f5ef7e05a8609c38
- hash: 4db2fa8e019cf499b8e08e7d036b68926309905eb1d6bb3d5466e551ac8d052e
- hash: 7d1de2f4ab7c35b53154dc490ad3e7ad19ff04cfaa10b1828beba1ffadbaf1ab
- hash: 7f2319f4e340b3877e34d5a06e09365f6356de5706e7a78e367934b8a58ed0e7
- hash: 91811e7a269be50ad03632e66a4a6e6b17b5b9b6d043b5ac5da16d5021de8ddb
- hash: 956934581dfdba96d69b77b14f6ab3228705862b2bd189cd98d6bfb9565d9570
- hash: 99016e8ca8a72da67264019970ab831064ecc1f10591c90ea3a2e1db530188ee
- hash: 9b93daf047b9010bf4e87ca71ae5aefae660820833c15877a9105215af0745cd
- hash: a2f0e6f9c5058085eac1c9e7a8b2060b38fd8dbdcba2981283a5e224f346e147
- hash: d682d5afbbbd9689d5f30db8576b02962af3c733bd01b8f220ff344a9c00abfd
- hash: e55b6664c77a9f3a98b32f46a20c2e392dcc7f1717fb69447e4e4229c7b6985d
- hash: e780d314ae6f9bf9d227df004a3c19ab7f3042e583d333f12022ef777ba9600a
- url: http://193.143.1.139/Ujdu8jjooue/biweax.php
- url: http://my-tasjeel-ae.com/droid.js
- url: http://my-tasjeel-ae.com/getfr.js
- url: http://my-tasjeel-ae.com/getid.js
- url: http://whitelabeliq.com/
- url: http://www-kodi.com/download.php
- url: http://www-kodi.com/droid.js
- url: http://www-kodi.com/getfr.js
- url: http://www-kodi.com/getgr.js
- url: http://www-kodi.com/getupd.js
- url: http://www-wpx.net/assets/core.js
- url: http://www-wpx.net/kodi-21.1-Omega-x64.msi
- domain: competitivewindscreens.com.au
- domain: education-ethologique.fr
- domain: embajadaguatemala.es
- domain: gr-playmarkets.com
- domain: iconichomestudios.com
- domain: lemasdessalettes.com
- domain: mikkiwaxbar.co.uk
- domain: my-tasjeel-ae.com
- domain: playstore-fr.com
- domain: playstore-spain.com
- domain: playstores-france.com
- domain: playstors-france.com
- domain: playstors-gr.com
- domain: spain-playmarket.com
- domain: spain-playstores.com
- domain: updatestore-spain.com
- domain: us-playmarket.com
Proton66: Compromised WordPress Pages and Malware Campaigns
Description
This intelligence briefing focuses on malware campaigns linked to Proton66, particularly those targeting Android devices through compromised WordPress websites. It details how these sites were injected with malicious scripts to redirect Android users to fake Google Play Store pages. The report also covers the XWorm campaign targeting Korean-speaking users, the Strela Stealer targeting German-speaking countries, and the WeaXor ransomware. The analysis provides insights into the infection chains, malware configurations, and command-and-control servers used in these campaigns. Additionally, it offers recommendations for blocking associated IP ranges and lists numerous indicators of compromise (IOCs) for each campaign.
AI-Powered Analysis
Technical Analysis
The Proton66 threat encompasses a series of malware campaigns primarily leveraging compromised WordPress websites to target Android users. Attackers inject malicious scripts into vulnerable WordPress pages, which then redirect Android visitors to counterfeit Google Play Store pages designed to distribute malware. This infection vector exploits the widespread use of WordPress as a content management system and the trust users place in Google Play Store interfaces. The campaigns include multiple malware families: XWorm, which targets Korean-speaking users and is known for remote access trojan (RAT) capabilities; Strela Stealer, focusing on German-speaking countries, designed to exfiltrate sensitive information such as credentials and financial data; and WeaXor ransomware, which encrypts victim data to demand ransom payments. The analysis of these campaigns reveals complex infection chains involving initial redirection, payload delivery, and command-and-control (C2) communications. Malware configurations are tailored to regional targets, indicating a strategic approach by Proton66. The campaigns also utilize specific IP ranges for C2 servers, which can be blocked to disrupt operations. While no known exploits are actively used to compromise WordPress sites, the injection of malicious scripts suggests exploitation of vulnerabilities or weak administrative controls. The campaigns demonstrate a multi-faceted approach combining phishing, malware distribution, and ransomware deployment, with a focus on Android platforms and regional targeting based on language and geography.
Potential Impact
European organizations face several risks from Proton66 campaigns. The Strela Stealer's targeting of German-speaking countries implies a direct threat to Germany, Austria, and parts of Switzerland, potentially compromising corporate credentials, financial information, and personal data, leading to financial loss and reputational damage. The use of compromised WordPress sites as infection vectors threatens any organization relying on WordPress for their web presence, risking website defacement, data leakage, and distribution of malware to visitors. Android users within European organizations are at risk of malware infection through fake app stores, which can lead to device compromise, unauthorized access to corporate networks, and lateral movement. The presence of WeaXor ransomware introduces the risk of data encryption and operational disruption, with potential ransom payments and recovery costs. Given the regional focus on German-speaking users and the broader targeting of Android platforms, organizations in Europe with significant Android device usage and WordPress-based infrastructure are particularly vulnerable. The campaigns' use of phishing and social engineering further increases the likelihood of successful infections, especially if user awareness is low.
Mitigation Recommendations
1. Conduct thorough security audits of all WordPress installations, including plugins and themes, to identify and remediate vulnerabilities or unauthorized script injections. 2. Implement strict access controls and multi-factor authentication for WordPress administrative accounts to prevent unauthorized modifications. 3. Regularly monitor website content and traffic for unusual redirects or script injections using automated scanning tools specialized in CMS security. 4. Block known Proton66-associated IP ranges at network perimeter firewalls and intrusion prevention systems to disrupt C2 communications. 5. Educate employees and users about the risks of fake app stores and phishing campaigns, emphasizing verification of app sources and cautious behavior on mobile devices. 6. Deploy mobile device management (MDM) solutions to enforce security policies on Android devices, including restrictions on app installations from unknown sources. 7. Maintain up-to-date backups of critical data and test restoration procedures to mitigate ransomware impact. 8. Utilize endpoint detection and response (EDR) tools capable of identifying behaviors associated with XWorm, Strela Stealer, and WeaXor malware. 9. Collaborate with threat intelligence providers to stay informed on emerging indicators of compromise and adapt defenses accordingly. 10. For organizations with German-speaking user bases, prioritize monitoring for Strela Stealer activity and tailor incident response plans to address potential data exfiltration scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://trustwave.com/en-us/resources/blogs/spiderlabs-blog/proton66-part-2-compromised-wordpress-pages-and-malware-campaigns"]
- Adversary
- Proton66
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash4c74caa9c0eeb2c7637da9bbde9535d7 | — | |
hasha087e994db776a0c657e45d315851186 | — | |
hasha74ee50d2f91f77f010ecb154aa6b30b | — | |
hashaf2fe7b209912ec3a345fd8169fde338 | — | |
hash61bff81cd5475552c73e0745d629b9265b84cb8c | — | |
hash90138ac54f4002803b7a88137da5ed2c5e46460c | — | |
hasha10d8e59c8ea698349c073df06d509e958cd3333 | — | |
hashc7207893a06a56f8f682e33fd32dc04700885317 | — | |
hash2d2bc95183f58a5e7fe9997b092120d6bfa18ed7ccb4f70b1af1b066ea16a1c3 | — | |
hash40b75aa3c781f89d55ebff1784ff7419083210e01379bea4f5ef7e05a8609c38 | — | |
hash4db2fa8e019cf499b8e08e7d036b68926309905eb1d6bb3d5466e551ac8d052e | — | |
hash7d1de2f4ab7c35b53154dc490ad3e7ad19ff04cfaa10b1828beba1ffadbaf1ab | — | |
hash7f2319f4e340b3877e34d5a06e09365f6356de5706e7a78e367934b8a58ed0e7 | — | |
hash91811e7a269be50ad03632e66a4a6e6b17b5b9b6d043b5ac5da16d5021de8ddb | — | |
hash956934581dfdba96d69b77b14f6ab3228705862b2bd189cd98d6bfb9565d9570 | — | |
hash99016e8ca8a72da67264019970ab831064ecc1f10591c90ea3a2e1db530188ee | — | |
hash9b93daf047b9010bf4e87ca71ae5aefae660820833c15877a9105215af0745cd | — | |
hasha2f0e6f9c5058085eac1c9e7a8b2060b38fd8dbdcba2981283a5e224f346e147 | — | |
hashd682d5afbbbd9689d5f30db8576b02962af3c733bd01b8f220ff344a9c00abfd | — | |
hashe55b6664c77a9f3a98b32f46a20c2e392dcc7f1717fb69447e4e4229c7b6985d | — | |
hashe780d314ae6f9bf9d227df004a3c19ab7f3042e583d333f12022ef777ba9600a | — |
Url
Value | Description | Copy |
---|---|---|
urlhttp://193.143.1.139/Ujdu8jjooue/biweax.php | — | |
urlhttp://my-tasjeel-ae.com/droid.js | — | |
urlhttp://my-tasjeel-ae.com/getfr.js | — | |
urlhttp://my-tasjeel-ae.com/getid.js | — | |
urlhttp://whitelabeliq.com/ | — | |
urlhttp://www-kodi.com/download.php | — | |
urlhttp://www-kodi.com/droid.js | — | |
urlhttp://www-kodi.com/getfr.js | — | |
urlhttp://www-kodi.com/getgr.js | — | |
urlhttp://www-kodi.com/getupd.js | — | |
urlhttp://www-wpx.net/assets/core.js | — | |
urlhttp://www-wpx.net/kodi-21.1-Omega-x64.msi | — |
Domain
Value | Description | Copy |
---|---|---|
domaincompetitivewindscreens.com.au | — | |
domaineducation-ethologique.fr | — | |
domainembajadaguatemala.es | — | |
domaingr-playmarkets.com | — | |
domainiconichomestudios.com | — | |
domainlemasdessalettes.com | — | |
domainmikkiwaxbar.co.uk | — | |
domainmy-tasjeel-ae.com | — | |
domainplaystore-fr.com | — | |
domainplaystore-spain.com | — | |
domainplaystores-france.com | — | |
domainplaystors-france.com | — | |
domainplaystors-gr.com | — | |
domainspain-playmarket.com | — | |
domainspain-playstores.com | — | |
domainupdatestore-spain.com | — | |
domainus-playmarket.com | — |
Threat ID: 682c992c7960f6956616a125
Added to database: 5/20/2025, 3:01:00 PM
Last enriched: 6/19/2025, 5:48:27 PM
Last updated: 8/17/2025, 4:54:22 AM
Views: 18
Related Threats
ThreatFox IOCs for 2025-08-16
MediumScammers Compromised by Own Malware, Expose $4.67M Operation and Identities
MediumThreatFox IOCs for 2025-08-15
MediumThreat Actor Profile: Interlock Ransomware
MediumColt Telecom attack claimed by WarLock ransomware, data up for sale
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.