Cyber Attack

New Android Malware Hijacks DNS Routers from SmartPhones

Any other day, some other creepy malware for Android users!
Security Researchers have uncovered a brand new Android malware concentrated on your devices, however this time in place of attacking the device at once. The malware takes manage over the WiFi router to which your tool is hooked up to after which hijacks the net visitors passing through it.
Dubbed “Switcher,” the new Android malware, determined by way of researchers at Kaspersky Lab, hacks the wifi routers and modifications their DNS settings to redirect visitors to malicious websites.
Over every week ago, Proof point researchers located similar assault targeting pcs, but in preference to infecting the goal’s machines, the Stegano take advantage of kit takes control over the local WiFi routers the inflamed tool is connected to.

Switcher Malware includes out Brute-force attack in opposition to Routers

Hackers are presently distributing the Switcher trojan by disguising itself as an Android app for the chinese seek engine Baidu (com.baidu.com), and as a chinese language app for sharing public and private wifi network info (com.snda.wifilocating).
As soon as sufferer installs one of these malicious apps. The Switcher malware tries to log in to the WiFi router the sufferer’s Android tool is connected to by using carrying out a brute-pressure attack on the router’s admin net interface with a set of a predefined dictionary (list) of usernames and passwords.
“With the help of JavaScript [Switcher] tries to login the use of specific combos of logins and passwords,” cell security professional Nikita Buchka of Kaspersky Lab says in a blog post published nowadays.
“Judging through the tough coded names of enter fields and the structures of the HTML documents that the trojan attempts to get right of entry to, the JavaScript code used will work most effective on net interfaces of TP-hyperlink wireless routers.”
Switcher Malware Infects Routers through DNS Hijacking router-dns-android-malware
as soon as accessed internet management interface, the Switcher trojan replaces the router’s number one and secondary DNS servers with IP addresses pointing to malicious DNS servers managed by way of the attackers.

Researchers stated Switcher had used three extraordinary IP addresses – a hundred and one.two hundred.147.153, 112.33.13.11. 100.276.249.59 – as the primary DNS document. One is the default one while the alternative are set for unique internet provider companies.
Due to alternate in router’s DNS settings, all of the site visitors gets redirected to malicious websites hosted on attackers very own servers. Instead of the valid site the sufferer is trying to get right of entry to.
“The Trojan objectives the complete community, exposing all its users, whether or not individuals or companies, to a wide variety of attacks – from phishing to secondary infection,” the post reads.

“A successful assault can be difficult to locate or even more difficult to shift: the new settings can live to tell the tale a router reboot, or even if the rogue DNS is disabled, the secondary DNS server is on hand to hold on.”
Researchers had been able to get right of entry to the attacker’s command and manipulate servers and discovered that the Switcher malware Trojan has compromised nearly 1,300 routers, specifically in China and hijacked site visitors within those networks.

To Top

Pin It on Pinterest

Share This