{"id":108464,"date":"2023-01-19T10:00:06","date_gmt":"2023-01-19T10:00:06","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/securelist\/?p=108464"},"modified":"2023-01-18T14:57:00","modified_gmt":"2023-01-18T14:57:00","slug":"roaming-mantis-dns-changer-in-malicious-mobile-app","status":"publish","type":"post","link":"https:\/\/securelist.com\/roaming-mantis-dns-changer-in-malicious-mobile-app\/108464\/","title":{"rendered":"Roaming Mantis implements new DNS changer in its malicious mobile app in 2022"},"content":{"rendered":"
Roaming Mantis (a.k.a Shaoye) is well-known as a long-term cyberattack campaign that uses malicious Android package (APK) files to control infected Android devices and steal device information; it also uses phishing pages to steal user credentials, with a strong financial motivation.<\/p>\n
Kaspersky has been investigating the actor’s activity throughout 2022, and we observed a DNS changer function used for getting into Wi-Fi routers and undertaking DNS hijacking. This was newly implemented in the known Android malware Wroba.o\/Agent.eq (a.k.a Moqhao, XLoader), which was the main malware used in this campaign.<\/p>\n
Back in 2018, Kaspersky first saw Roaming Mantis activities<\/a> targeting the Asian region, including Japan, South Korea and Taiwan. At that time, the criminals compromised Wi-Fi routers for use in DNS hijacking, which is a very effective technique. It was identified as a serious issue in both Japan<\/a> and South Korea<\/a>. Through rogue DNS servers, all users accessing a compromised router were redirected to a malicious landing page. From mid-2019 until 2022, the criminals mainly used smishing instead of DNS hijacking to deliver a malicious URL as their landing page. The landing page identified the user’s device platform to provide malicious APK files for Android or redirect to phishing pages for iOS.<\/p>\n <\/a><\/p>\n Infection flow with DNS hijacking<\/em><\/strong><\/p>\n In September 2022, we carried out a deep analysis of Wroba.o (MD5 f9e43cc73f040438243183e1faf46581) and discovered the DNS changer was implemented to target specific Wi-Fi routers. It obtains the default gateway IP address as the connected Wi-Fi router IP, and checks the device model from the router’s admin web interface.<\/p>\n <\/a><\/p>\n Code for checking Wi-Fi router model<\/em><\/strong><\/p>\n The following strings are hardcoded for checking the Wi-Fi router model:<\/p>\n