



As mobile security continues to be a growing concern, new forms of malware, such as the Switcher Android Trojan, are emerging. This malware targets Wi-Fi routers by executing brute-force attacks on their default credentials, ultimately compromising DNS settings and affecting all devices connected to the compromised network.
Discovered by researchers at Kaspersky Lab, Switcher presents a new wave of cyber threats that don’t directly attack Android devices but instead use them as a tool to infiltrate wireless networks. Once the router is compromised, malicious actors can reroute all internet traffic through rogue DNS servers, allowing them to launch a variety of cyber-attacks, such as phishing, data interception, or malware distribution, against unsuspecting users connected to the infected network.
The Switcher Trojan operates in a sophisticated manner, targeting wireless routers and altering their DNS configurations. Below is a breakdown of how this malware operates:
Step 1: Initial Infection
Switcher usually spreads through fake applications that resemble legitimate services. For example:
Once the malware is installed on a user’s device, it doesn’t attack the Android system directly. Instead, it begins scanning the local network for vulnerable routers.
Step 2: Brute-Force Attack on Routers
The Trojan targets routers, initiating brute-force attacks on the router’s default login credentials. This method is particularly effective since many users don’t change the default passwords provided by manufacturers.
Step 3: Altering DNS Settings
Once Switcher successfully logs into the router:
Step 4: Exploiting the Network
After the DNS settings have been modified, all devices connected to the compromised router are vulnerable to:
Malware distribution: Users connected to the compromised network could unknowingly download malware or ransomware from seemingly legitimate sites.
Even though the Trojan specifically targets routers, the impact extends to every device connected to that network. Here are some key consequences:
The Domain Name System (DNS) is essential for translating user-friendly domain names into machine-readable IP addresses. By hijacking the DNS settings of a router, Switcher can redirect users to malicious websites without their knowledge. This is the crux of the attack and the reason why it is so dangerous.
What is DNS Hijacking?
DNS hijacking, also known as DNS redirection, occurs when an attacker changes the DNS settings of a router or device to point to rogue DNS servers. Once this happens, users trying to access legitimate websites are instead sent to malicious sites.
DNS hijacking allows attackers to:
In the case of Switcher, the Trojan alters the DNS settings of compromised routers, exposing all devices connected to that network to potential attacks.
Identifying whether your network has been compromised by Switcher is crucial for mitigating further damage. Here’s how you can detect and prevent this type of attack:
The Switcher Android Trojan shares similarities with other DNS-targeting malware such as DNS Changer. DNS Changer is notorious for altering DNS settings on routers to redirect traffic, much like Switcher. The key difference is that Switcher primarily targets TP-LINK routers, whereas DNS Changer affected a wider range of devices, including D-Link, Net Gear, and Pirelli.
If you’re concerned about the security of your network or mobile devices, Cyber Security Hive offers comprehensive services to help protect your digital assets. Whether you need penetration testing, mobile security assessments, or network vulnerability analysis, our team of experts is here to assist.
Contact us today at contactus@cybersecurityhive.com or +91-9901024214 to schedule a consultation.