How Roaming Mantis Malware Hijacks DNS to Infect Android, iOS, and PCs

The Roaming Mantis malware exploits compromised routers to perform DNS hijacking, redirecting Android, iOS, and desktop users to malicious sites that install fake updates, steal credentials, and run CoinHive mining scripts, while spreading across more than twenty languages worldwide.

ITPUB
ITPUB
ITPUB
How Roaming Mantis Malware Hijacks DNS to Infect Android, iOS, and PCs

What Is DNS Hijacking?

DNS hijacking tricks a browser by altering the DNS response so that the domain name resolves to an attacker‑controlled IP address, while the URL bar still shows the legitimate domain, making the redirection invisible to users.

Roaming Mantis on Android

When a device connects to a compromised router, the malware redirects any request to a malicious site that prompts the user to update their browser. The update is a fake chrome.apk (or facebook.apk) that requests extensive permissions such as account access, SMS, calls, audio recording, and file access. After installation, the malware harvests Google account information, displays a fake login prompt, and collects personal data like name and birthdate.

Android infection flow
Android infection flow

Roaming Mantis on iOS

For iOS devices the malware skips the APK download and instead serves a phishing page that mimics an App Store login. The page uses a trusted‑looking URL (e.g., security.apple.com) to convince users to re‑enter their Apple ID credentials and even their bank card numbers.

iOS phishing page
iOS phishing page

PC Coin Mining

On Windows PCs the malware runs a CoinHive script that mines cryptocurrency directly to the attacker’s wallet, consuming CPU cycles, causing system slowdown, and increasing power consumption.

PC mining activity
PC mining activity

How to Prevent Infection

Install security software on computers, laptops, smartphones, and tablets.

Keep all operating system and application software up to date.

On Android, disable installation from unknown sources (Settings → Security → Unknown sources).

Regularly update router firmware and avoid unofficial firmware from untrusted sites.

Router firmware update
Router firmware update
Security best practices
Security best practices
Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

iOSAndroidDNS hijackingmalwarecoin mining
ITPUB
Written by

ITPUB

Official ITPUB account sharing technical insights, community news, and exciting events.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.