Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Ongoing ‘Roaming Mantis’ Smishing Campaign Hits Over 70,000 Users in France

A Chinese threat actor named Roaming Mantis has been targeting Android users in France with the MoqHao malware in a new smishing campaign, security researchers with Sekoia warn.

A Chinese threat actor named Roaming Mantis has been targeting Android users in France with the MoqHao malware in a new smishing campaign, security researchers with Sekoia warn.

The campaign uses phishing SMS messages containing an embedded malicious link to trick unsuspecting victims into downloading malware on their Android devices, or into accessing a phishing page designed to harvest Apple login credentials.

Roaming Mantis is a financially motivated threat actor operating out of China, which has been observed using the MoqHao malware in attacks targeting entities in Japan, Germany, South Korea, Taiwan, the US, and the UK.

Also known as Wroba and XLoader for Android, MoqHao is a remote access trojan (RAT) that provides the threat actor with information-stealing and backdoor capabilities.

According to Sekoia, the ongoing campaign has already resulted in the compromise of approximately 70,000 Android devices across France – users outside the country were served an error message when clicking on the malicious link in the SMS message.

Android users in France who clicked on the link were lured into downloading the malware in the form of a browser update.

Once executed, the MoqHao malware requests permissions to access and send SMS, which allows it to intercept messages the victim might receive. To trick the user into giving it the requested permissions, the malware poses as Chrome.

The payload uses stored social networking profiles to request its command and control (C&C) server. According to Sekoia, more than 90,000 unique IP addresses were observed requesting the C&C server that distributes the malware.

“This activity leveraging MoqHao or Apple IDs’ credential harvesting pages notably provides Roaming Mantis access to data from the local system, SD card, applications, messages or contact list, iCloud backups, iMessage, call history, as well as allowing remote interaction with a victims’ device,” Sekoia notes.

The security researchers believe that Roaming Mantis could use the collected sensitive data to set up extortion schemes, or that it could sell the information to other threat groups.

Related: Europol Announces Takedown of FluBot Mobile Spyware

Related: ‘MaliBot’ Android Malware Steals Financial, Personal Information

Related: SharkBot Android Malware Continues Popping Up on Google Play

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.