WireX DDoS Botnet
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Threat details
Approximately 300 apps have been removed from Google Play Store after been identified as containing the WireX malware. A list of removed applications doesn’t currently exist.
Once the WireX malware is downloaded, it will wait for further instructions from its Command & Control (C2) server before it is activated.
The following User-Agent strings were identified in many logs from earlier DDoS attacks:
- User-Agent: jigpuzbcomkenhvladtwysqfxr
- User-Agent: yudjmikcvzoqwsbflghtxpanre
- User-Agent: mckvhaflwzbderiysoguxnqtpj
- User-Agent: deogjvtynmcxzwfsbahirukqpl
- User-Agent: fdmjczoeyarnuqkbgtlivsxhwp
- User-Agent: yczfxlrenuqtwmavhojpigkdsb
- User-Agent: dnlseufokcgvmajqzpbtrwyxih
Any organisation that has suffered a DDoS attack during the month of August 2017 is recommended to check their logs for the above IOC’s. This will help identify whether it was the WireX botnet that was involved in the attack.
**Update 15/09/2017**
The researchers which initially found the WireX malware have now found a variant which includes User Datagrama Protocol (UDP) flood capabilities. A WireX bot is capable of creating 50 threads each sending up to 10 million UDP packets at 512 bytes in size.
Remediation steps
Last edited: 17 February 2020 11:41 am