Connect with us

Hi, what are you looking for?



Ongoing ‘Roaming Mantis’ Smishing Campaign Hits Over 70,000 Users in France

A Chinese threat actor named Roaming Mantis has been targeting Android users in France with the MoqHao malware in a new smishing campaign, security researchers with Sekoia warn.

A Chinese threat actor named Roaming Mantis has been targeting Android users in France with the MoqHao malware in a new smishing campaign, security researchers with Sekoia warn.

The campaign uses phishing SMS messages containing an embedded malicious link to trick unsuspecting victims into downloading malware on their Android devices, or into accessing a phishing page designed to harvest Apple login credentials.

Roaming Mantis is a financially motivated threat actor operating out of China, which has been observed using the MoqHao malware in attacks targeting entities in Japan, Germany, South Korea, Taiwan, the US, and the UK.

Also known as Wroba and XLoader for Android, MoqHao is a remote access trojan (RAT) that provides the threat actor with information-stealing and backdoor capabilities.

According to Sekoia, the ongoing campaign has already resulted in the compromise of approximately 70,000 Android devices across France – users outside the country were served an error message when clicking on the malicious link in the SMS message.

Android users in France who clicked on the link were lured into downloading the malware in the form of a browser update.

Once executed, the MoqHao malware requests permissions to access and send SMS, which allows it to intercept messages the victim might receive. To trick the user into giving it the requested permissions, the malware poses as Chrome.

The payload uses stored social networking profiles to request its command and control (C&C) server. According to Sekoia, more than 90,000 unique IP addresses were observed requesting the C&C server that distributes the malware.

Advertisement. Scroll to continue reading.

“This activity leveraging MoqHao or Apple IDs’ credential harvesting pages notably provides Roaming Mantis access to data from the local system, SD card, applications, messages or contact list, iCloud backups, iMessage, call history, as well as allowing remote interaction with a victims’ device,” Sekoia notes.

The security researchers believe that Roaming Mantis could use the collected sensitive data to set up extortion schemes, or that it could sell the information to other threat groups.

Related: Europol Announces Takedown of FluBot Mobile Spyware

Related: ‘MaliBot’ Android Malware Steals Financial, Personal Information

Related: SharkBot Android Malware Continues Popping Up on Google Play

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how to utilize tools, controls, and design models needed to properly secure cloud environments.


Event: ICS Cybersecurity Conference

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.


People on the Move

SaaS security company AppOmni has hired Joel Wallenstrom as its General Manager.

FTI Consulting has appointed Brett Callow as Managing Director in its Cybersecurity & Data Privacy Communications practice.

Mobile security firm Zimperium has welcomed David Natker as its VP of Global Partners and Alliances.

More People On The Move

Expert Insights