Cyber security firm Kaspersky has detected a new Android malware that takes control of users device by hacking routers and directs user to genuine looking websites created by it to steal their details.
The malware supports content in 27 languages, including Hindi, Chinese, Arabic, Bulgarian and Russian, according to a statement issued by Kaspersky.
"Kaspersky Lab's findings indicate that the attackers behind Roaming Mantis seek out vulnerable routers for compromise, and distribute the malware through a simple yet very effective trick of hijacking the DNS settings of those infected routers," the company said.
DNS converts name of websites into digital addresses and helps them connecting with servers on which websites are hosted.
The Russian cyber security firm, however, has not been able to find method which the malware uses to hack routers but said that once the malware successfully hijacks the DNS, any attempt by users to access any website leads them to a genuine-looking URL with forged content coming from the attackers' server like page requesting user to download latest version of chrome browser for better experience or update for any other social media app to add new features etc.
"The Roaming Mantis malware checks to see if the device is rooted and requests permission to be notified of any communications or browsing activity undertaken by the user. It is also capable of collecting a wide range of data, including credentials for two-factor authentication," the statement said.
Most of the credit card companies use two-factor authentication to complete transaction, which includes one-time password to user on their mobile phones for verification.
"The malware included support for four languages: Korean, simplified Chinese, Japanese, and English. The attack range has now been extended, supporting 27 languages in all, including Polish, German, Hindi, Arabic, Bulgarian and Russian," it said.
The Kaspersky Lab researchers on April 16 reported on a new Android malware distributed through a domain name system (DNS) hijacking technique and targeting mainly smartphones in Asia.
The researchers found that even after four weeks the threat continues to evolve rapidly and has now extended its target geography to include Europe and the Middle East, adding a phishing option for iOS devices and PC crypto-mining capability.
Kaspersky Lab's initial research uncovered around 150 targets, mainly in South Korea, Bangladesh, and Japan, but it also revealed thousands of connections hitting the attackers' command & control servers on a daily basis, pointing to a far larger scale of attack.
Disclaimer: No Business Standard Journalist was involved in creation of this content
You’ve reached your limit of {{free_limit}} free articles this month.
Subscribe now for unlimited access.
Already subscribed? Log in
Subscribe to read the full story →
Smart Quarterly
₹900
3 Months
₹300/Month
Smart Essential
₹2,700
1 Year
₹225/Month
Super Saver
₹3,900
2 Years
₹162/Month
Renews automatically, cancel anytime
Here’s what’s included in our digital subscription plans
Exclusive premium stories online
Over 30 premium stories daily, handpicked by our editors


Complimentary Access to The New York Times
News, Games, Cooking, Audio, Wirecutter & The Athletic
Business Standard Epaper
Digital replica of our daily newspaper — with options to read, save, and share


Curated Newsletters
Insights on markets, finance, politics, tech, and more delivered to your inbox
Market Analysis & Investment Insights
In-depth market analysis & insights with access to The Smart Investor


Archives
Repository of articles and publications dating back to 1997
Ad-free Reading
Uninterrupted reading experience with no advertisements


Seamless Access Across All Devices
Access Business Standard across devices — mobile, tablet, or PC, via web or app
