Aug. 27, 2023, 6:15 a.m. |

DataBreachToday.co.uk RSS Syndication www.databreachtoday.co.uk

'Whiffy Recon' Uses WiFi Access Points, Google API for Geolocation
A backdoor Trojan known as SmokeLoader is deploying a customized WiFi scanning executable to triangulate the location of infected Windows devices. The malware, dubbed "Whiffy Recon," uses nearby WiFi access points as a data point for Google's geolocation API.

access access points api backdoor data devices geolocation google location malware point points recon scanning smokeloader tracking trojan whiffy whiffy recon wifi windows

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden