Kaspersky Lab detects Roaming Mantis attacks on smartphones in Asia via DNS hijacking

17th April 2018 | By Mouseworld Now Correspondent |


New Delhi, 17th April, 2018: Kaspersky Lab researchers have discovered a new Android malware distributed through a domain name system (DNS) hijacking technique and targeting smartphones, mostly in Asia.

The campaign, dubbed Roaming Mantis remains highly active and is designed to steal user information including credentials and to provide attackers with full control over the compromised Android device. Between February and April 2018, researchers detected the malware in over 150 user networks, mainly in South Korea, Bangladesh, and Japan, but there are likely to be many more victims.
Researchers believe a cybercriminal group looking for financial gain is behind the operation.

Kaspersky Lab’s findings indicate that the attackers behind the malware seek out vulnerable routers for compromise and distribute the malware through a simple yet very effective trick of hijacking the DNS settings of those infected routers. The method of router compromise remains unknown. Once the DNS is successfully hijacked, any attempt by users to access any website leads them to a genuine-looking URL with forged content coming from the attackers’ server. This includes the request: “To better experience the browsing, update to the latest chrome version.” Clicking on the link initiates the installation of a Trojanized application named either ‘facebook.apk’ or ‘chrome.apk’, which contains the attackers’ Android backdoor.
The Roaming Mantis malware checks to see if the device is rooted and requests permission to be notified of any communications or browsing activity undertaken by the user. It is also capable of collecting a wide range of data, including credentials for two-factor authentication.

Researchers found that some of the malware code includes references to mobile banking and game application IDs popular in South Korea. Taken together, these indicators suggest a possible financial motive behind this campaign.

While Kaspersky Lab’s detection data uncovered around 150 targets, further analysis also revealed thousands of connections hitting the attackers’ command & control (C2) servers on a daily basis, pointing to a far larger scale of attack.

The design of Roaming Mantis’ malware shows it is intended for wider distribution across Asia. Among other things, it supports four languages: Korean, simplified Chinese, Japanese, and English. However, the artifacts gathered suggest the threat actors behind this attack are familiar mostly with Korean and simplified Chinese.

In order to protect your internet connection from this infection, Kaspersky Lab recommends the following:

●Refer to your router’s user manual to verify that your DNS settings haven’t been tampered with or contact your ISP for support.
●Change the default login and password for the admin web interface of the router.
●Never install router firmware from third party sources. Avoid using third-party repositories for your Android devices.
●Regularly update your router’s firmware from the official source.

Leave your comment

IMPORTANT! To be able to proceed, you need to solve the following simple math

What is 3 + 13 ?
Please leave these two fields as-is:

Mouseworldnow Videos
  • r chandrashekhar president nasscom
  • Anant Maheshwari, President, Microsoft India
  • Suresh_Vaswani-220 by 220

Channel News

  • Capillary Technologies Attains AWS Retail Competency Status more...
  • MG Motor Opens its first digital car-less showroom, MG Digital Studio more...
  • Globus Infocom to Participate in InfoComm India 2019 Expo more...
  • ASUS Opens New ASUS Exclusive Store in B’lore more...
  • COMPUTEX 2019 Successfully Comes to a Close at Taipei more...
dell for SMEs
Subscribe via email

Enter your email address:

What does the mouse ask?

Will the spurt in online video advertisement steal the twinkle from the TV ad platform?

View Results

Loading ... Loading ...
Newsletter Registration