{"id":22427,"date":"2018-05-18T06:16:15","date_gmt":"2018-05-18T10:16:15","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=22427"},"modified":"2019-11-15T06:37:03","modified_gmt":"2019-11-15T11:37:03","slug":"roaming-mantis-malware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/roaming-mantis-malware\/22427\/","title":{"rendered":"Roaming Mantis infects smartphones through Wi-Fi routers"},"content":{"rendered":"<p>Some time ago our experts <a href=\"https:\/\/securelist.com\/roaming-mantis-uses-dns-hijacking-to-infect-android-smartphones\/85178\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">investigated a piece of malware that they dubbed Roaming Mantis<\/a>. Back then, the people affected were mainly users from Japan, Korea, China, India, and Bangladesh, so we didn\u2019t discuss the malware in the context of other regions; it seemed to be a local threat.<\/p>\n<p>However, in the month since the report was published, Roaming Mantis has added two dozen more languages and is rapidly spreading around the world.<\/p>\n<p>The malware uses compromised routers to infect Android-based smartphones and tablets. It then redirects iOS devices to a phishing site and runs the CoinHive cryptomining script on desktops and laptops. It does so by means of DNS hijacking, making it hard for targeted users to detect that something\u2019s amiss.<\/p>\n<h3>What is DNS hijacking<\/h3>\n<p>When you enter a site name in your browser address bar, the browser doesn\u2019t actually send a request to that site. It can\u2019t; the Internet operates on IP addresses, which are sets of numbers, whereas domain names with words are easier for people to remember and input.<\/p>\n<p>When you enter a URL, your browser sends a request to a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/dns-domain-name-system-server\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DNS-server<\/a> (DNS is Domain Name System), which translates the human-friendly name into the IP address of the corresponding website. It is this IP address that the browser uses to locate and open the site.<\/p>\n<p>DNS hijacking is a way of fooling the browser into thinking it has matched the domain name to the correct IP address when in fact it hasn\u2019t. Although the IP address is wrong, the original URL entered by the user is displayed in the browser address bar, so nothing looks suspicious.<\/p>\n<p>There are many DNS-hijacking techniques, but the creators of Roaming Mantis have chosen perhaps the simplest and most effective: They hijack the settings of compromised routers, forcing them to use their own rogue DNS servers. That means regardless of what is typed into the browser address bar of a device connected to this router, the user is redirected to a malicious site.<\/p>\n<h3>Roaming Mantis on Android<\/h3>\n<p>After the user is redirected to the malicious site, they are prompted to update the browser. That leads to the download of a malicious app named <b>chrome.apk<\/b> (there was another version as well, named <b>facebook.apk<\/b>).<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/05\/18060935\/roaming-mantis-malware-scr-1.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-22432\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/05\/18060935\/roaming-mantis-malware-scr-1.jpg\" alt=\"Roaming Mantis on Android\" width=\"1460\" height=\"1250\"><\/a><\/p>\n<p>The malware requests a bunch of <a href=\"https:\/\/www.kaspersky.com\/blog\/android-permissions-guide\/14014\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">permissions<\/a> during the installation process, including rights to access account information, send and receive SMS messages, process voice calls, record audio, access files, display its own window on top of others, and so on. For a trusted application such as Google Chrome, the list doesn\u2019t seem too suspicious\u00a0\u2014 if the user considers this \u201cbrowser update\u201d legit, they are sure to grant permissions without even reading the list.<\/p>\n<p>After the application is installed, the malware uses the right to access the list of accounts to find out which Google account is used on the device. Next, the user is shown a message (it appears on top of all other open windows, another permission the malware requested) saying that something is wrong with their account and that they need to sign in again. A page then opens and prompts the user to enter their name and date of birth.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/05\/18061008\/roaming-mantis-malware-scr-2.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-22433\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/05\/18061008\/roaming-mantis-malware-scr-2.png\" alt=\"Roaming Mantis on Android\" width=\"535\" height=\"439\"><\/a><\/p>\n<p>It appears that this data, together with the SMS permissions that grant access to the one-time codes needed for two-factor authentication, is then used by the creators of Roaming Mantis to steal Google accounts.<\/p>\n<h3>Roaming Mantis: World tour, iOS debut, and mining<\/h3>\n<p>In the beginning, Roaming Mantis could display messages in four languages: English, Korean, Chinese, and Japanese. But somewhere along the line, its creators decided to expand and add another two dozen languages to their polyglot malware:<\/p>\n<ul>\n<li>Arabic<\/li>\n<li>Armenian<\/li>\n<li>Bulgarian<\/li>\n<li>Bengali<\/li>\n<li>Czech<\/li>\n<li>Georgian<\/li>\n<li>German<\/li>\n<li>Hebrew<\/li>\n<li>Hindi<\/li>\n<li>Indonesian<\/li>\n<li>Italian<\/li>\n<li>Malay<\/li>\n<li>Polish<\/li>\n<li>Portuguese<\/li>\n<li>Russian<\/li>\n<li>Serbo-Croat<\/li>\n<li>Spanish<\/li>\n<li>Tagalog<\/li>\n<li>Thai<\/li>\n<li>Turkish<\/li>\n<li>Ukrainian<\/li>\n<li>Vietnamese<\/li>\n<\/ul>\n<p>While they were at it, the creators also improved Roaming Mantis, teaching it to attack devices running iOS. It\u2019s a different scenario from the Android attacks. On iOS, Roaming Mantis skips downloading the application; instead, the malicious site displays a phishing page prompting the user to log back in to the App Store right away. To add credibility, the address bar shows the reassuring URL <b>security.apple.com<\/b>:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/05\/18061116\/roaming-mantis-malware-scr-3.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-22434\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/05\/18061116\/roaming-mantis-malware-scr-3.png\" alt=\"Roaming Mantis phishing on iOS\" width=\"1619\" height=\"720\"><\/a><\/p>\n<p>The cybercriminals do not confine their theft to Apple ID credentials; immediately after entering this data, the user is asked for a bank card number:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/05\/18061151\/roaming-mantis-malware-scr-4.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-22435\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/05\/18061151\/roaming-mantis-malware-scr-4.png\" alt=\"Roaming Mantis phishing on iOS\" width=\"1248\" height=\"720\"><\/a><\/p>\n<p>The third innovation our experts uncovered concerns desktop computers and laptops. On these devices, Roaming Mantis runs the CoinHive mining script, which <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/mining-cryptocurrency\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">mines<\/a> cryptocurrency and dumps it straight into the pockets of the malware makers. The victim\u2019s computer processor is loaded to the max, forcing the system to slow down and consume vast amounts of power.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/05\/18061259\/roaming-mantis-malware-scr-5.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-22436\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/05\/18061259\/roaming-mantis-malware-scr-5.png\" alt=\"Roaming Mantis mining on desktops and laptops\" width=\"617\" height=\"375\"><\/a><\/p>\n<p>You can find more details about Roaming Mantis in the <a href=\"https:\/\/securelist.com\/roaming-mantis-uses-dns-hijacking-to-infect-android-smartphones\/85178\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">original report<\/a> and a <a href=\"https:\/\/securelist.com\/roaming-mantis-dabbles-in-mining-and-phishing-multilingually\/85607\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">fresh Securelist post with updated information about the malware<\/a>.<\/p>\n<h3>How to protect from Roaming Mantis<\/h3>\n<ul>\n<li>Use <a href=\"https:\/\/www.kaspersky.com\/internet-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">antivirus protection<\/a> on all devices: not just computers and laptops, but smartphones and tablets too.<\/li>\n<li>Regularly update all installed software on your devices.<\/li>\n<li>On Android devices, disable the installation of applications from unknown sources. You\u2019ll find this option under <em>Settings -&gt; Security -&gt; Unknown sources<\/em>.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/08\/17053208\/unknown-sources-EN.jpg\"><img decoding=\"async\" class=\"aligncenter size-medium wp-image-18007\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/08\/17053208\/unknown-sources-EN-300x208.jpg\" alt=\"\" width=\"300\" height=\"208\"><\/a><\/p>\n<ul>\n<li> Update your router firmware (check your router\u2019s manual to find out how) as often as possible. Don\u2019t use unofficial firmware downloaded from shady sites.<\/li>\n<li>Always change the default administrator password on the router.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n<h3>What to do if infected by Roaming Mantis<\/h3>\n<p>Kaspersky security products detect and remove Roaming Mantis, so your first step is to install <a href=\"https:\/\/www.kaspersky.com\/internet-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">antivirus<\/a> on all of your devices and run a system scan. After you scrub Roaming Mantis from your computers and devices, you\u2019ll need to do a bit of cleanup to avoid reinfection:<\/p>\n<ul>\n<li>Change all passwords for accounts compromised by the malware. Cancel all bank cards for which you entered details on the Roaming Mantis phishing site. <\/li>\n<li>Change the router administrator password and update the firmware. In doing so, be sure to download it only from the official website of the router manufacturer. <\/li>\n<li>Navigate to your router\u2019s settings and check the DNS server address. If it doesn\u2019t match the one issued by your provider \u2014 you can find that on your ISP\u2019s website (check it from a safe system!) or call them to find out \u2014 change it back to the right one. <\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Originally targeting users from Japan, Korea, and China, Roaming Mantis is quickly spreading worldwide, infecting smartphones through hacked wi-fi routers.<\/p>\n","protected":false},"author":421,"featured_media":22428,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2683],"tags":[105,2944,1250,2639,76,2945,473,45],"class_list":{"0":"post-22427","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-android","10":"tag-dns-hijacking","11":"tag-ios","12":"tag-mining","13":"tag-phishing","14":"tag-roaming-mantis","15":"tag-routers","16":"tag-smartphones"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/roaming-mantis-malware\/22427\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/roaming-mantis-malware\/13323\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/roaming-mantis-malware\/11121\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/roaming-mantis-malware\/15396\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/roaming-mantis-malware\/13672\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/roaming-mantis-malware\/12982\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/roaming-mantis-malware\/16170\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/roaming-mantis-malware\/15738\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/roaming-mantis-malware\/20600\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/roaming-mantis-malware\/4937\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/roaming-mantis-malware\/10548\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/roaming-mantis-malware\/10330\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/roaming-mantis-malware\/16779\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/roaming-mantis-malware\/20283\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/roaming-mantis-malware\/20278\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/smartphones\/","name":"smartphones"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22427","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22427"}],"version-history":[{"count":10,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22427\/revisions"}],"predecessor-version":[{"id":29724,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22427\/revisions\/29724"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22428"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22427"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}