Researchers from Secureworks Counter Threat Unit (CTU) have discovered a new malware called Whiffy Recon  . This malware is found on compromised Windows machines that were previously infected with the SmokeLoader botnet . Whiffy Recon is a customized Wi-Fi scanning executable for Windows systems that tracks the physical locations of its victims by scanning for nearby Wi-Fi access points  .
Whiffy Recon utilizes Google’s geolocation API to triangulate the infected systems’ positions and maps the coordinates to a JSON structure containing detailed information about each wireless access point in the area, including encryption methods used . To maintain persistence  , the malware adds a shortcut to the Windows Startup folder. It checks for the presence of the WLANSVC service on compromised Windows systems  , but does not confirm if the service is operational . If the service does not exist   , the scanner exits .
The main code of the malware runs in two loops. One loop registers the bot with the C2 server    , while the other performs Wi-Fi scanning every 60 seconds using the Windows WLAN API. The scan results are then sent to a remote command-and-control server controlled by the threat actor .
The purpose of obtaining this information is unclear , but it is suspected that it could be used to intimidate victims or pressure them to comply with demands . Organizations are advised to review and restrict access using the indicators provided to mitigate exposure to this malware .
The discovery of Whiffy Recon highlights the ongoing threat of malware targeting Windows systems. Its ability to track victims’ physical locations through Wi-Fi scanning raises concerns about privacy and potential misuse of this information. Organizations should take immediate steps to review and restrict access using the indicators provided to minimize the risk of exposure to this malware. Additionally, further research and analysis are needed to fully understand the motivations and potential impacts of this malware, as well as to develop effective mitigation strategies.