A Chinese threat actor named Roaming Mantis has been targeting Android users in France with the MoqHao malware in a new smishing campaign, security researchers with Sekoia warn.
The campaign uses phishing SMS messages containing an embedded malicious link to trick unsuspecting victims into downloading malware on their Android devices, or into accessing a phishing page designed to harvest Apple login credentials.
Roaming Mantis is a financially motivated threat actor operating out of China, which has been observed using the MoqHao malware in attacks targeting entities in Japan, Germany, South Korea, Taiwan, the US, and the UK.
Also known as Wroba and XLoader for Android, MoqHao is a remote access trojan (RAT) that provides the threat actor with information-stealing and backdoor capabilities.
According to Sekoia, the ongoing campaign has already resulted in the compromise of approximately 70,000 Android devices across France – users outside the country were served an error message when clicking on the malicious link in the SMS message.
Android users in France who clicked on the link were lured into downloading the malware in the form of a browser update.
Once executed, the MoqHao malware requests permissions to access and send SMS, which allows it to intercept messages the victim might receive. To trick the user into giving it the requested permissions, the malware poses as Chrome.
The payload uses stored social networking profiles to request its command and control (C&C) server. According to Sekoia, more than 90,000 unique IP addresses were observed requesting the C&C server that distributes the malware.
“This activity leveraging MoqHao or Apple IDs’ credential harvesting pages notably provides Roaming Mantis access to data from the local system, SD card, applications, messages or contact list, iCloud backups, iMessage, call history, as well as allowing remote interaction with a victims’ device,” Sekoia notes.
The security researchers believe that Roaming Mantis could use the collected sensitive data to set up extortion schemes, or that it could sell the information to other threat groups.
Related: Europol Announces Takedown of FluBot Mobile Spyware
Related: ‘MaliBot’ Android Malware Steals Financial, Personal Information
Related: SharkBot Android Malware Continues Popping Up on Google Play