- Feb 4, 2016
- 2,520
... some quotes from the article above:
An Android trojan named Switcher (Trojan.AndroidOS.Switcher) targets Android devices in order to take over local WiFi routers and hijack the web traffic passing through them.
Discovered by security researchers from Kaspersky Lab, this trojan is currently distributed among Chinese users as a clone of the official Baidu Android app (com.baidu.com), and as an application for sharing details and passwords about public and private WiFi networks (com.snda.wifilocating).
Switcher brute-forces local WiFi routers
The way this trojan works is by collecting information on the user's WiFi network after infecting a phone or tablet. Switcher sends this information to a public C&C server, which determines the user's ISP and decides on what DNS records to use at a later stage.
Once the trojan gets the go-ahead from its C&C server, Switcher attempts to login on the user's home WiFi router by trying a set of default admin credentials.
Hijacking DNS settings simplifies phishing operations
Hijacking DNS servers is an ancient malware technique, used by multiple families in the past. The reason behind hijacking DNS servers is to re-route users to clones of legitimate websites, hosted on the crooks' own servers.
This way, the attacker can collect login credentials for banking portals, social media profiles, online stores, and others.
More recently, exploit kits such as Stegano have also started targeting home routers, in order to hijack web traffic and insert unwanted ads.