Android malware Roaming Mantis attacks European users

Android malware Roaming Mantis targets Android and iPhone users in Germany and France using malware and phishing attacks, researchers warn.

Let me remind you that Roaming Mantis was discovered back in 2018. Initially, it attacked users from Japan, Korea, Trung Quốc, India and Bangladesh, but then it “spoke” in two dozen more languages and began to spread rapidly to other countries.

The malware used compromised routers to infect Android smartphones and tablets, redirected iOS devices to a phishing site, and launched CoinHive mining scripts on desktops and laptops. For all this, các DNS hijacking technique was usedDNS spoofing, which is why attacks were often not immediately detected.

Now, malware is also spreading through SMS phishing (sometimes referred to as “smishing”), with which hackers promote malicious Android apps as separate APK files, that is, not from the Google Play Store.

Android malware Roaming Mantis

According to phòng thí nghiệm kaspersky, new versions of Roaming Mantis use the Wroba Trojan and mainly target users from France and Germany, sending out malicious SMS and links to infected sites. The purpose of Wroba is to steal information about the victim’s e-banking, and it is automatically distributed via SMS messages to the entire contact list of the infected device.

Clicking on a link from such an SMS, if the URL was opened from an Apple device, redirects the victim to a phishing page where hackers will try to steal the user’s Apple login credentials. If the victim is using an Android device, they are taken to another landing page that offers to install malware disguised as an Android app. The malware usually masks itself as Google Chrome or the Yamato and ePOST apps.

Android malware Roaming Mantis

Below is the statistics of malware downloads in just one day in September 2021, that is, we are talking about tens of thousands of APK downloads in European countries.

Android malware Roaming Mantis

Compared to previous versions, Wrogba has undergone changes and is now written in Kotlin. In total, the malware can execute 21 malicious commands, including two new ones: get_galleryget_photo, which are designed to steal photos and videos of the victim. According to the researchers, this can be used for the purpose of financial fraud, identity theft, blackmail and extortion (in the case of confidential data theft).

One possible [attack] scenario is that criminals steal driver’s license data, health insurance cards or bank cards in order to subscribe to services where payments are made via QR codes or mobile payment services. Cũng, criminals can use stolen photos to get money in other ways, including blackmail and sexual extortion.experts say.

Let me remind you that we reported that SharkBot Android Trojan Steals Cryptocurrency and Hacks Bank Accounts, và đó cũng là AbstractEmu Android malware “roots” smartphones and evades detection.

Helga Smith

Tôi luôn quan tâm đến khoa học máy tính, đặc biệt là bảo mật dữ liệu và chủ đề, được gọi là ngày nay "khoa học dữ liệu", kể từ khi tôi còn ở tuổi thiếu niên. Trước khi vào nhóm Diệt Virus với vai trò Tổng biên tập, Tôi đã làm việc với tư cách là chuyên gia an ninh mạng tại một số công ty, bao gồm một trong những nhà thầu của Amazon. Một trải nghiệm khác: Tôi đã nhận được đang giảng dạy tại các trường đại học Arden và Reading.

Để lại một câu trả lời

Website này sử dụng Akismet để hạn chế spam. Tìm hiểu bình luận của bạn được duyệt như thế nào.

Nút quay lại đầu trang