Sunday, May 25, 2025
HomeAndroidHackers Compromise iOS & Android Devices by Dropping Malware Over Hijacked WiFi...

Hackers Compromise iOS & Android Devices by Dropping Malware Over Hijacked WiFi Routers

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminals attempting to compromise iOS & Android devices via advanced Phishing campaign that redirect iOS users to a malicious landing page which allows attackers to collect sensitive information and the Android users are compromised with malware via Hijacked WiFi Routers.

Researchers believe that the attack belongs to Roaming Mantis campaign that uses DNS hijacking attack to hack Android smartphones, current attack carries updates on their tools and tactics.

In order to compromise iOS devices and to collect the data, attackers let
iPhone user visits a new landing page where the user forced to download the malicious iOS mobile config installation.

- Advertisement - Google News

After the installation process, users redirect into the phishing site that automatically opens in a web browser and collected information from the device will be sent to the attacker’s server.

Once users enter their credentials then it redirects to the next page, which tried to steal the two-factor authentication code (PIN) sent to the device.


Phishing page for stealing apple ID and two-factor authentication

Malicious APK Targets an Android

Researchers discovered another malicious APK which is a variant of sagawa.apk, a malware that was earlier distributed via SMS in Japan.

According to Kaspersky, We also found out that the threat actors had compromised WiFi routers to overwrite DNS settings and discovered that the following two features were updated as well to compromise Android devices.:

  • Decryption algorithm for encrypted payload in Trojan-Dropper module
  • Stored destination and accounts for getting real C2

This new campaign affected many countries includes Russia, Japan, India, Bangladesh, Kazakhstan, Azerbaijan, Iran and Vietnam

Also, researchers detected this malware over 6,800 times for over 950 unique users during this period.

Beware …

  • Change the default ID and password, and apply the relevant security patches to counter these threats;
  • For Android users: do not download APKs from third-party sources;
  • For iOS users: do not install a non-trusted third-party mobile config.

Indicator of Compromise:

417a6af1172042986f602cc0e2e681dcAPK file
651b6888b3f419fc1aac535921535324APK file
0a4e8d3fe5ee383ba3a22d0f00670ce3APK file
870697ddb36a8f205478c2338d7e6bc7APK file
7e247800b95c643a3c9d4a320b12726b\classes.dex
7cfb9ed812e0250bfcb4022c567771ec\classes.dex
8358d2a39d412edbd1cf662e0d8a9f19\classes.dex
7cfb9ed812e0250bfcb4022c567771ec\classes.dex
af2890a472b85d473faee501337564a9Decrypted dex file
c8d7475a27fb7d669ec3787fe3e9c031Decrypted dex file
d0848d71a14e0f07c6e64bf84c30ee39Decrypted dex file
e2b557721902bc97382d268f1785e085Decrypted dex file

Course: Learn Malware Analysis – Advance Malware Analyst Bundle

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

GenAI Assistant DIANNA Uncovers New Obfuscated Malware

Deep Instinct’s GenAI-powered assistant, DIANNA, has identified a sophisticated new malware strain dubbed BypassERWDirectSyscallShellcodeLoader. This...

New Formjacking Malware Targets E-Commerce Sites to Steal Credit Card Data

A disturbing new formjacking malware has emerged, specifically targeting WooCommerce-based e-commerce sites to steal...