A financially motivated campaign that targets Android devices and spreads mobile malware via SMS phishing techniques since at least 2018 has spread its tentacles to strike victims located in France and Germany for the first time.
Dubbed Roaming Mantis, the latest spate of activities observed in 2021 involve sending fake shipping-related texts containing a URL to a landing page from where Android users are infected with a banking trojan known as Wroba whereas iPhone users are redirected to a phishing page that masquerades as the official Apple website.
The top affected countries, based on telemetry data gathered by Kaspersky between July 2021 and January 2022, are France, Japan, India, China, Germany, and Korea.
Also tracked under the names MoqHao and XLoader (not to be confused with the info-stealer malware of the same name targeting Windows and macOS), the group's activity has continued to expand geographically even as the operators broadened their attack methods to mine cryptocurrency from Apple devices and evade detection.
The primary goal of the campaign is to deploy Wroba, which functions both as a spyware and banking malware, with capabilities to replace legitimate apps with malicious versions and steal credentials associated with victims' online bank accounts.
Discover the untapped vulnerabilities in your API ecosystem and take proactive steps towards ironclad security. Join our insightful webinar!Join the Session
Further analysis of the malware artifacts has revealed the shift in programming language from Java to Kotlin and the addition of two new backdoor commands that allow Wroba to exfiltrate galleries and photos from infected devices.
"One possible scenario is that the criminals steal details from such things as driver's licenses, health insurance cards or bank cards, to sign up for contracts with QR code payment services or mobile payment services," the researchers said. "The criminals are also able to use stolen photos to get money in other ways, such as blackmail or sextortion."