Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile Security //

Android

5/22/2018
09:35 AM
Jeffrey Burt
Jeffrey Burt
Jeffrey Burt
50%
50%

Roaming Mantis Android Malware Expands Its Reach to iOS, Cryptomining

The rapidly evolving campaign that is Roaming Mantis now includes iOS devices, expansion into new regions around the world, additional cryptomining capabilities and it is becoming even more evasive.

Malware that had been used to steal information from Android devices has evolved rapidly to include new devices and capabilities and to expand globally, according to researchers at Kaspersky Lab.

Kaspersky and other security firms had been following the malware, dubbed Roaming Mantis, for several months. Roaming Mantis had spread through DNS highjacking that sent users who tried to get to the website through a compromised router to a malicious site. The site would distribute an application that was installed manually by users and contained an Android Trojan-Banker.

The attacks focused on regions in Asia, including Japan, South Korea and Bangladesh.

However, since then the malware has evolved rapidly. It has expanded geographically to include countries in Europe and the Middle East, with Russia, Ukraine and India being the hardest hit and the US also seeing users affected. Roaming Mantis also has grown the number of languages it uses from four to 27 through an automated translator to support the wider attack areas. The languages range from English, German and Spanish to Hindi, Serbo-Croation and Czech.

Still, the comments that are added are in simple Chinese, according to Kaspersky.

In addition to the geographical expansion, it also is now targeting Apple iOS devices, as well as PCs, and has expanded its efforts to include cryptocurrency mining, and the evasion techniques the malware uses also has become more sophisticated.

"The Roaming Mantis campaign evolved significantly in a short period of time," Kaspersky researcher Suguru Ishimaru wrote in a post on the company blog, noting that much of that evolution has occurred between March and May. "The rapid growth of the campaign implies that those behind it have a strong financial motivation and are probably well-funded."

The evolution of the malware "is not new, but on the other hand, it's not very usual to have such a high speed of development and diversification," Vitaly Kamluk, director of Kaspersky Lab's Global Research and Analysis Team in the APAC region, told Security Now in an email. "Such a fast evolution may be driven by high financial interest. It seems that someone is working on this full time and expects some return on investment. Very often this means some criminal syndicate is behind it and drives the process."

With iOS devices, the cyber-criminals use a phishing site to steal user credentials. Once the user hits the landing page, they are redirected to "http://security.apple.com/." The phishing site steals such information as the user's ID and password, credit card number, expiration data and CVV. The HTML source code of the phishing site supports 25 of the 27 languages referred to earlier -- only Bengali and Georgian are missing.

Also in the HTML source code is a special script that is executed in the browser that enables cryptocurrency mining. When the user connects to the landing page from a PC, a Coinhive JavaScript is used to mine Monero cryptocurrency.

Cryptomining is has become a highly popular malware in recent months, with security research firms such as Check Point, Fortinet and MalwareBytes reporting skyrocketing numbers of incidents since the end of last year. Through cryptomining, threat actors can use the CPU power of PCs, mobile devices and servers to mine cryptocurrency. (See Check Point: Cryptomining Malware Targeting Vulnerable Servers.)

The malware is less intrusive than something like ransomware and can run in the background far longer. However, there are signs users should be aware of to let them know if such malware in on their systems, including the machines running slower or application performance faltering. (See Mobile Malware Increases, While Hiding in Porn Sites.)

"Coinhive is the most popular web miner used by cybercriminals around the world," Ishimaru wrote. "When a user connects to the landing page from a PC, the CPU usage will drastically increase because of the crypto mining activity in the browser."

Other points where Roaming Mantis has evolved includes the adding of a new backdoor command -- "ping," which joins others like "SendSms," "setForward" and "showHome" -- bringing the total number to 19, and new evasion techniques.

One technique is having the landing page on the rogue server generate a filename for the malicious APK file using eight random numbers.

"Aside from the filename, we also observed that all the downloaded malicious apk files are unique due to package generation in real time as of May 16, 2018," Ishimaru wrote. "It seems the actor added automatic generation of apk per download to avoid blacklisting by file hashes. This is a new feature."

Related posts:

— Jeffrey Burt is a long-time tech journalist whose work has appeared in such publications as eWEEK, The Next Platform and Channelnomics.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17475
PUBLISHED: 2020-08-14
Lack of authentication in the network relays used in MEGVII Koala 2.9.1-c3s allows attackers to grant physical access to anyone by sending packet data to UDP port 5000.
CVE-2020-0255
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-14353
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-17464
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2020-17473
PUBLISHED: 2020-08-14
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.