Wi-Fi routers are being hit by a dangerous new Android malware with extra DNS hacks

Zero-day attack

Audio player loading…

A new Android app has been found tricking unsuspecting users (even those with clean devices) into visiting malicious versions of popular websites, where they might end up giving away their login credentials, or even worse – money. 

The findings come courtesy of Kaspersky, which found a malicious Android app carrying the Wroba.o/Agent.eq (a.k.a Moqhao, XLoader) malware was being distributed. 

When the app is downloaded, it will try to connect to the Wi-Fi router the mobile device is connected to. To do that, it will try the most usual username/password combinations, as well as those known to come with factory settings (such as admin/admin). Should it succeed, it will change the DNS server to a malicious one the threat actor has control over.

TechRadar Pro needs you! (opens in new tab) We want to build a better website for our readers, and we need your help! You can do your bit by filling out our survey (opens in new tab) and telling us your opinions and views about the tech industry in 2023. It will only take a few minutes and all your answers will be anonymous and confidential. Thank you again for helping us make TechRadar Pro even better.

D. Athow, Managing Editor

Roaming Mantis

That allows the malware’s operators to redirect all users connected to that specific Wi-Fi network, including those without the malware, to malicious versions of popular websites. 

For example, if a compromised endpoint connects to a public Wi-Fi in a busy cafe, and ends up changing the DNS server settings in the router, everyone else in that cafe that tries to connect to Facebook will actually be redirected to a fake Facebook page. There, they’ll be asked to provide their login information and if they do, they’ll end up giving away their login credentials to the crooks.

The researchers did not name the apps being distributed, but did say that the APKs were downloaded at least 46,000 times across Japan, Austria, France, Germany, South Korea, Turkey, Malaysia, and India. With more than 24,000 downloads, Japan is by far the most affected country.

The group behind the apps is allegedly Roaming Mantis. To protect against this type of attack, the best course of action would be to avoid connecting to important accounts on public Wi-Fi networks. 

Via: ArsTechnica (opens in new tab)

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
Best Wordpress Adblock Detecting Plugin | CHP Adblock