A Chinese threat actor named Roaming Mantis has been targeting Android users in France with the MoqHao malware in a new smishing campaign, security researchers with Sekoia warn.
The campaign uses phishing SMS messages containing an embedded malicious link to trick unsuspecting victims into downloading malware on their Android devices, or into accessing a phishing page designed to harvest Apple login credentials.
Roaming Mantis is a financially motivated threat actor operating out of China, which has been observed using the MoqHao malware in attacks targeting entities in Japan, Germany, South Korea, Taiwan, the US, and the UK.
Also known as Wroba and XLoader for Android, MoqHao is a remote access trojan (RAT) that provides the threat actor with information-stealing and backdoor capabilities.
According to Sekoia, the ongoing campaign has already resulted in the compromise of approximately 70,000 Android devices across France – users outside the country were served an error message when clicking on the malicious link in the SMS message.
Android users in France who clicked on the link were lured into downloading the malware in the form of a browser update.
Once executed, the MoqHao malware requests permissions to access and send SMS, which allows it to intercept messages the victim might receive. To trick the user into giving it the requested permissions, the malware poses as Chrome.
The payload uses stored social networking profiles to request its command and control (C&C) server. According to Sekoia, more than 90,000 unique IP addresses were observed requesting the C&C server that distributes the malware.
“This activity leveraging MoqHao or Apple IDs’ credential harvesting pages notably provides Roaming Mantis access to data from the local system, SD card, applications, messages or contact list, iCloud backups, iMessage, call history, as well as allowing remote interaction with a victims’ device,” Sekoia notes.
The security researchers believe that Roaming Mantis could use the collected sensitive data to set up extortion schemes, or that it could sell the information to other threat groups.
Related: Europol Announces Takedown of FluBot Mobile Spyware
Related: ‘MaliBot’ Android Malware Steals Financial, Personal Information
Related: SharkBot Android Malware Continues Popping Up on Google Play

More from Ionut Arghire
- Toyota Discloses New Data Breach Involving Vehicle, Customer Information
- Adobe Inviting Researchers to Private Bug Bounty Program
- Critical Vulnerabilities Found in Faronics Education Software
- Chrome 114 Released With 18 Security Fixes
- Spyware Found in Google Play Apps With Over 420 Million Downloads
- Millions of WordPress Sites Patched Against Critical Jetpack Vulnerability
- PyPI Enforcing 2FA for All Project Maintainers to Boost Security
- Personal Information of 9 Million Individuals Stolen in MCNA Ransomware Attack
Latest News
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Toyota Discloses New Data Breach Involving Vehicle, Customer Information
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Amazon Settles Ring Customer Spying Complaint
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Adobe Inviting Researchers to Private Bug Bounty Program
- Critical Vulnerabilities Found in Faronics Education Software
