The danger actor identified as Roaming Mantis (or Shaoye) has reportedly included a DNS changer operate to its most up-to-date cellular application Wroba.o to infiltrate WiFi routers and undertake DNS hijacking.
The results arrive from Kaspersky’s SecureList researchers, who posted an advisory about Roaming Mantis before currently.
According to the technological publish-up, the threat actor has been conducting a prolonged-time period campaign that works by using malicious Android deal (APK) files to handle infected Android gadgets and attain machine details.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
“Back in 2018, Kaspersky 1st noticed Roaming Mantis routines focusing on the Asian location, which includes Japan, South Korea and Taiwan. At that time, the criminals compromised Wi-Fi routers for use in DNS hijacking, which is a really efficient system,” reads the advisory.
“From mid-2019 right up until 2022, the criminals primarily employed smishing alternatively of DNS hijacking to deliver a malicious URL as their landing page.”
This web site, Kaspersky wrote, recognized the user’s unit platform to produce malicious APK information for Android or redirect to phishing webpages for iOS.
“In September 2022, we […] discovered the DNS changer was applied to target distinct Wi-Fi routers. It obtains the default gateway IP tackle as the connected Wi-Fi router IP and checks the device model from the router’s admin web interface.”
The security scientists also found that the element was implemented to mostly focus on WiFi routers situated in South Korea. Victims of Roaming Mantis ended up also spotted in France, Japan, Germany, the US, Taiwan, Turkey and other locations.
“We imagine that the discovery of this new DNS changer implementation is very crucial in phrases of security,” SecureList warned.
“The attacker can use it to control all communications from products making use of a compromised Wi-Fi router with rogue DNS settings. For instance, the attacker can redirect to destructive hosts and interfere with security products updates.”
Kaspersky mentioned they see the potential for the group to use the DNS changer to focus on other areas and result in sizeable issues. To support companies location Roaming Mantis’ Wroba.o infections, a record of indicators of compromise (IoC) is out there in the SecureList advisory.
Its publication comes weeks following Google declared it is more and more bettering Android security with memory-harmless programming languages.
Some areas of this posting are sourced from:
www.infosecurity-magazine.com