A malware that infects smartphones through Wi-Fi routers – dubbed ‘Roaming Mantis’ – is rapidly spreading across the world after first emerging only a couple months ago.
Through DNS hijacking, the malware uses compromised routers to infect Android smartphones and tablets, redirect iOS devices to a phishing site, and run CoinHive, a cryptomining script, on desktops and computers.
Having until now mainly affected users in Japan, Korea, China, India and Bangladesh, Roaming Mantis has added two dozen more languages – including Arabic, Russian, and a host of European languages – and is rapidly spreading around the world, according to Kaspersky Lab, a cybersecurity company.
Roaming Mantis has chosen the simplest and most effective form of DNS hijacking, according to Kaspersky, which involves hijacking the settings of compromised routers and forcing them to use their own rogue DNS servers, meaning a user will be redirected to a malicious site if using a device connected to the compromised router.
Although the malware only affected Android devices when it first emerged, its creators have now taught it to attack iOS devices.
Android users are prompted to update the browser, before downloading a malicious app disguised as Chrome, or Facebook, which requests a series of permissions and uses these to crack two-factor authentication and hijack Google accounts.
Users of iOS, meanwhile, are redirected to a mockup of the Apple website, named security.apple.com, and are prompted to enter their login details, as well as their bank card number.
The final “innovation” researchers uncovered was Roaming Mantis running a CoinHive mining script on desktops and laptops – loading processes to the max and consuming vast amounts of power to mine cryptocurrency for its creators.
Roaming Mantis was first detected in March, Kaspersky said, in Japanese reports of hijacked DNS settings on routers redirecting users to malicious IP addresses – leading the cybersecurity company to publish initial research into the malware last month.
“During our research we received some invaluable information about the true scale of this attack. There were thousands of daily connections to the command and control (C2) infrastructure, with the device locale for the majority of victims set to Korean,” wrote junior researcher Suguru Ishimaru.
“Since we didn’t find a pre-existing name for this malware operation, we decided to assign a new one for future reference. Based on its propagation via smartphones roaming between Wi-Fi networks, potentially carrying and spreading the infection, we decided to call it ‘Roaming Mantis’.”