Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile Security //

Android

5/22/2018
09:35 AM
Jeffrey Burt
Jeffrey Burt
Jeffrey Burt
50%
50%

Roaming Mantis Android Malware Expands Its Reach to iOS, Cryptomining

The rapidly evolving campaign that is Roaming Mantis now includes iOS devices, expansion into new regions around the world, additional cryptomining capabilities and it is becoming even more evasive.

Malware that had been used to steal information from Android devices has evolved rapidly to include new devices and capabilities and to expand globally, according to researchers at Kaspersky Lab.

Kaspersky and other security firms had been following the malware, dubbed Roaming Mantis, for several months. Roaming Mantis had spread through DNS highjacking that sent users who tried to get to the website through a compromised router to a malicious site. The site would distribute an application that was installed manually by users and contained an Android Trojan-Banker.

The attacks focused on regions in Asia, including Japan, South Korea and Bangladesh.

However, since then the malware has evolved rapidly. It has expanded geographically to include countries in Europe and the Middle East, with Russia, Ukraine and India being the hardest hit and the US also seeing users affected. Roaming Mantis also has grown the number of languages it uses from four to 27 through an automated translator to support the wider attack areas. The languages range from English, German and Spanish to Hindi, Serbo-Croation and Czech.

Still, the comments that are added are in simple Chinese, according to Kaspersky.

In addition to the geographical expansion, it also is now targeting Apple iOS devices, as well as PCs, and has expanded its efforts to include cryptocurrency mining, and the evasion techniques the malware uses also has become more sophisticated.

"The Roaming Mantis campaign evolved significantly in a short period of time," Kaspersky researcher Suguru Ishimaru wrote in a post on the company blog, noting that much of that evolution has occurred between March and May. "The rapid growth of the campaign implies that those behind it have a strong financial motivation and are probably well-funded."

The evolution of the malware "is not new, but on the other hand, it's not very usual to have such a high speed of development and diversification," Vitaly Kamluk, director of Kaspersky Lab's Global Research and Analysis Team in the APAC region, told Security Now in an email. "Such a fast evolution may be driven by high financial interest. It seems that someone is working on this full time and expects some return on investment. Very often this means some criminal syndicate is behind it and drives the process."

With iOS devices, the cyber-criminals use a phishing site to steal user credentials. Once the user hits the landing page, they are redirected to "http://security.apple.com/." The phishing site steals such information as the user's ID and password, credit card number, expiration data and CVV. The HTML source code of the phishing site supports 25 of the 27 languages referred to earlier -- only Bengali and Georgian are missing.

Also in the HTML source code is a special script that is executed in the browser that enables cryptocurrency mining. When the user connects to the landing page from a PC, a Coinhive JavaScript is used to mine Monero cryptocurrency.

Cryptomining is has become a highly popular malware in recent months, with security research firms such as Check Point, Fortinet and MalwareBytes reporting skyrocketing numbers of incidents since the end of last year. Through cryptomining, threat actors can use the CPU power of PCs, mobile devices and servers to mine cryptocurrency. (See Check Point: Cryptomining Malware Targeting Vulnerable Servers.)

The malware is less intrusive than something like ransomware and can run in the background far longer. However, there are signs users should be aware of to let them know if such malware in on their systems, including the machines running slower or application performance faltering. (See Mobile Malware Increases, While Hiding in Porn Sites.)

"Coinhive is the most popular web miner used by cybercriminals around the world," Ishimaru wrote. "When a user connects to the landing page from a PC, the CPU usage will drastically increase because of the crypto mining activity in the browser."

Other points where Roaming Mantis has evolved includes the adding of a new backdoor command -- "ping," which joins others like "SendSms," "setForward" and "showHome" -- bringing the total number to 19, and new evasion techniques.

One technique is having the landing page on the rogue server generate a filename for the malicious APK file using eight random numbers.

"Aside from the filename, we also observed that all the downloaded malicious apk files are unique due to package generation in real time as of May 16, 2018," Ishimaru wrote. "It seems the actor added automatic generation of apk per download to avoid blacklisting by file hashes. This is a new feature."

Related posts:

— Jeffrey Burt is a long-time tech journalist whose work has appeared in such publications as eWEEK, The Next Platform and Channelnomics.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/17/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8225
PUBLISHED: 2020-09-18
A cleartext storage of sensitive information in Nextcloud Desktop Client 2.6.4 gave away information about used proxies and their authentication credentials.
CVE-2020-8237
PUBLISHED: 2020-09-18
Prototype pollution in json-bigint npm package < 1.0.0 may lead to a denial-of-service (DoS) attack.
CVE-2020-8245
PUBLISHED: 2020-09-18
Improper Input Validation on Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11....
CVE-2020-8246
PUBLISHED: 2020-09-18
Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-W...
CVE-2020-8247
PUBLISHED: 2020-09-18
Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-W...