Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Hundreds Targeted in Recent Roaming Mantis Campaign

Hundreds of users have been targeted with malware over the past month as part of attacks that Kaspersky Lab has linked to last year’s Roaming Mantis campaign.

Hundreds of users have been targeted with malware over the past month as part of attacks that Kaspersky Lab has linked to last year’s Roaming Mantis campaign.

The attacks, which included the spreading of phishing links within malicious SMS messages (SMiShing), mainly impacted users in Russia, Japan, India, Bangladesh, Kazakhstan, Azerbaijan, Iran and Vietnam.

From February 25 to March 20, 2019, Kaspersky detected Roaming Mantis-related malware over 6,800 times for more than 950 unique users.

“We believe this attack wave has a much bigger scale and these numbers reflect only a small part of this campaign,” the security firm says.

The latest wave of attacks employed a new method of phishing with malicious mobile configurations, but the attackers also continued to use the previously observed DNS manipulation technique.

The major change in these attacks, compared to previous Roaming Mantis attacks, is the use of a new landing page to target iOS devices, where users are prompted to install a malicious iOS mobile configuration.

Once the configuration has been installed, the phishing site is automatically launched in a web browser and information from the device is collected and sent to the attackers.

Android users are also targeted, but with malware that Trend Micro refers to as XLoader and McAfee tracks as MoqHao. As part of the campaign, the actors also compromised routers to overwrite DNS settings.

Advertisement. Scroll to continue reading.

A URL query of a malicious DNS changer is used to compromise router DNS settings, but only under the following conditions: no authentication for the router’s control panel from the localnet; the device has an admin session for the router panel; and a simple username and password (or default) are used for the router, such as admin:admin.

Kaspersky says several hundred routers have been compromised, with all of them pointed to the rogue DNS IPs.

“This wave is characterized by a new attack method of phishing with malicious mobile config, although the previously observed DNS manipulation is also still actively used. We find the use of malicious mobile config especially alarming as this may cause serious problems for the users,” Kaspersky concludes.

Related: XLoader Trojan Poses as Security App for Android

Related: Android Trojan Spreads via DNS Hijacking

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Hear from experts as they explore the latest trends, challenges and innovations in Attack Surface Management.

Register

Event: ICS Cybersecurity Conference

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

People on the Move

Janet Rathod has been named VP and CISO at Johns Hopkins University.

Barbara Larson has joined SentinelOne as Chief Financial Officer.

Amy Howland has been named Partner and CISO at Guidehouse.

More People On The Move

Expert Insights