roaming-mantis-financial-hackers-targeting-android-and-iphone-users-in-france

Share news article

Share on facebook
Share on twitter
Share on linkedin
Share on email

Roaming Mantis Financial Hackers Targeting Android and iPhone Users in France

The mobile threat campaign tracked as Roaming Mantis has been linked to a new wave of compromises directed against French mobile phone users, months after it expanded its targeting to include European countries.

No fewer than 70,000 Android devices are said to have been infected as part of the active malware operation, Sekoia said in a report published last week.

Attack chains involving Roaming Mantis, a financially motivated Chinese threat actor, are known to either deploy a piece of banking trojan named MoqHao (aka XLoader) or redirect iPhone users to credential harvesting landing pages that mimic the iCloud login page.

“MoqHao (aka Wroba, XLoader for Android) is an Android remote access trojan (RAT) with information-stealing and backdoor capabilities that likely spreads via SMS,” Sekoia researchers said.

It all starts with a phishing SMS, a technique known as smishing, enticing users with package delivery-themed messages containing rogue links, that, when clicked, proceed to download the malicious APK file, but only after determining if a victim’s location is within French borders.

Should a recipient be located outside France and the device operating system is neither Android nor iOS – a factor ascertained by checking the IP address and the User-Agent string – the server is designed to respond with a “404 Not found” status code.

“The smishing campaign is therefore geofenced and aims to install Android malware, or collect Apple iCloud credentials,” the researchers pointed out.

MoqHao typically uses domains generated through the dynamic DNS service Duck DNS for its first-stage delivery infrastructure. What’s more, the malicious app masquerades as the Chrome web browser application to trick users into granting it invasive permissions.

The spyware trojan, using these permissions, provides a pathway for remote interaction with the infected devices, enabling the adversary to stealthily harvest sensitive data such as iCloud data, contact lists, call history, SMS messages, among others.

Sekoia also assessed that the amassed data could be used to facilitate extortion schemes or even sold to other threat actors for profit. “More than 90,000 unique IP addresses […] requested the C2 server distributing MoqHao,” the researchers noted.


Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post.

Related News

Threat Actors Using Go-based HinataBot to launch DDoS Attacks

Threat Actors Using Go-based HinataBot to launch DDoS Attacks

The botnet is based on the Mirai botnet, and since it is actively updated, the new versions have additional features…
Analysis of the recent volatility in the cryptocurrency market

Analysis of the recent volatility in the cryptocurrency market

The cryptocurrency market is extremely volatile. The unpredictable nature is both good and bad for traders and investors. Regardless of…
Hackers can hijack Samsung and Pixel phones by knowing phone number

Hackers can hijack Samsung and Pixel phones by knowing phone number

The cybersecurity researchers at Google identified eighteen zero-day vulnerabilities, four of which allowed Hackers to remotely compromise smartphone devices using…