Tech & Gadgets

Roaming Mantis Uses Domain Name System Changers To Target Users Via Compromised Public Routers

On January 19, Kaspersky researchers reported on a new domain name system (DNS) changer functionality used in the Roaming Mantis campaign. Now cybercriminals can use compromised Wi-Fi routers in cafes, airports hotels, and other public places to potentially infect more Android smartphones with the Wroba.o malware. At the moment, the new technique targets users in South Korea, but it can be soon implemented in other countries as well. 

Roaming Mantis (a.k.a Shaoye) is a cybercriminal campaign first observed by Kaspersky in 2018. It uses malicious Android package (APK) files to control infected Android devices and steal device information. It also has a phishing option for iOS devices and crypto-mining capabilities for PCs. The name of the campaign is based on its propagation via smartphones roaming between Wi-Fi networks, potentially carrying and spreading the infection.

New DNS changer functionality to attack more users via public routers

Kaspersky discovered that Roaming Mantis recently introduced a domain name system (DNS) changer functionality in Wroba.o (a.k.a Agent. eq, Moqhao, XLoader) – the malware that was primarily used in the campaign. A DNS changer is a malicious program that directs the device connected to a compromised Wi-Fi router to a server under the control of cybercriminals instead of a legitimate DNS server. On the malicious landing page, the potential victim is prompted to download malware that can control the device or steal credentials.

At the moment, the threat actor behind Roaming Mantis is exclusively targeting routers located in South Korea and manufactured by a very popular South Korean network equipment vendor. To identify them, the new DNS changer functionality gets the router’s IP address and checks the router’s model, compromising targeted ones by overwriting the DNS settings. In December 2022, Kaspersky observed 508 malicious APKs downloads in the country (see Table 1). 

An investigation of malicious landing pages found that attackers are also targeting other regions using smishing instead of DNS changes. This technique employs text messages to spread malicious links that direct the victim to a malicious site to download malware onto the device or steal user info via a phishing website. Japan topped the list of targeted countries with nearly 25 000 malicious APK downloads from the landings created by cybercriminals. Austria and France followed with roughly 7000 downloads each. Germany, Turkey, Malaysia, and India rounded the list. Kaspersky researchers predict that the perpetrators may soon update the DNS changer function to target Wi-Fi routers in those regions as well. 

Country Number of downloaded malicious APK
Japan 24645
Austria 7354
France 7246
Germany 5827
South Korea 508
Turkey 381
Malaysia 154
India 28

 

Table 1. The number of malicious APK downloads per country based on an investigation of malicious landing pages created within the Roaming Mantis campaign, in the first half of December 2022

According to Kaspersky Security Network (KSN) statistics in September – December 2022, the highest detection rate of Wroba.o malware (Trojan-Dropper.AndroidOS.Wroba.o) was in France (54.4%), Japan (12.1%), and the U.S. (10.1%). 

 When an infected smartphone connects to “healthy” routers in various public places like cafes, bars, libraries, hotels, shopping malls, airports, or even homes, Wroba. o malware can compromise these routers and affect other connected devices as well. The new DNS changer functionality can manage all device communications using the compromised Wi-Fi router, such as redirecting to malicious hosts and disabling updates of security products. We believe that this discovery is highly critical for the cybersecurity of Android devices because it is capable of being widely spread in the targeted regions”, says Suguru Ishimaru, Senior Security Researcher at Kaspersky.

To read the full report on the newly implemented DNS changer functionality, please visit Securelist.com.

In order to protect your internet connection from this infection, Kaspersky researchers recommend the following:

  • Refer to your router’s user manual to verify that your domain name system settings haven’t been tampered with or contact your ISP for support.
  • Change the default login and password for the admin web interface of the router and regularly update your router’s firmware from the official source.
  • Never install router firmware from third-party sources. Avoid using third-party repositories for your Android devices.
  • Further, always check browser and website addresses to ensure they are legitimate; look for signs such as HTTP when asked to enter data.
  • Consider installing a mobile security solution, such as a special security solution, to protect your devices from these and other threats.
Adib Mohd

Recent Posts

SEACare 2025 Solidifies Malaysia’s Leadership in Southeast Asia’s Healthcare Landscape

Malaysia’s commitment to transforming its healthcare system takes centre stage this week as SEACare 2025,… Read More

2 days ago

Drop: A First Date That Turns Into a Psychological Minefield

What happens when trust, trauma, and tequila meet at the same table?  That’s the unnerving… Read More

2 days ago

SME Bank Collaborates with Autism Cafe Project to Empower Autistic Entrepreneurs

Small Medium Enterprise Development Bank Malaysia Berhad (“SME Bank”) has partnered with The Autism Cafe… Read More

2 days ago

Pahlawan Malaysia 2025: Malaysia’s Premier Obstacle Sports Competition Set to Energize the Nation at the Curve, Mutiara Damansara

The Malaysia Obstacle Race Sports Association is proud to announce Pahlawan Malaysia 2025, the premier… Read More

2 days ago

Tesla Malaysia is Celebrating the ‘Earth Week’ to Rewards Owners in Conjunction with a ‘Refer and Win’ Campaign

Embracing the mission to accelerate the world’s transition to sustainable energy, Tesla Malaysia launches the… Read More

2 days ago

Malaysia’s Viper Niza Racing On The Winners’ Podium At The 12 Hours Of Spa Francorchamps

Malaysians Douglas Khoo, Dominic Ang and Melvin Moh raced to a podium finish at last… Read More

2 days ago

This website uses cookies.