Switcher Android Trojan: A New Threat to Wi-Fi Networks

Switcher Android Trojan: A New Threat to Wi-Fi Networks
Switcher Android Trojan: A New Threat to Wi-Fi Networks
Switcher Android Trojan: A New Threat to Wi-Fi Networks
Switcher Android Trojan: A New Threat to Wi-Fi Networks
Switcher Android Trojan: A New Threat to Wi-Fi Networks

Switcher Android Trojan Guide

Written by Cyber Security Hive on November 1st, 2016

Topics: Malware & Virus Removal

Cyber security experts have discovered yet another Trojan malware that can steal sensitive data from Android phones. Dubbed Switcher, this malware infects wireless routers via default credentials and brute-force attacks.

Once Switcher compromises a router, it changes the DNS settings of the device. With this access, attackers can reroute the traffic of any smartphone or computer connected to the affected network.

Attackers can use your compromised router to conduct phishing attacks, steal information, or even redirect you to malicious websites hosting malware.

How Does the Switcher Android Trojan Work?

As mentioned before, Switcher is a Trojan Android malware that targets wireless routers instead of Android devices. Figure 1 shows how Switcher attacks routers via brute-force method.

[Kaspersky Switcher Android Trojan]

Figure 1. A visualization of the Switcher Trojan attack.

Step 1: Initial Infection

Trojan malware like Switcher usually comes disguised as attractive fake apps. Switcher arrives on phones through bogus apps like these:

Fake Baidu app impersonates a Chinese web search app.

Fake Wi-Fi sharing app. Sounds sketchy already!

Your phone gets infected with the Trojan after you install these malicious apps. However, Switcher does not target Android devices directly. Instead it scans through all routers connected to your local network.

Step 2: Router Brute-force Attack

Switcher targets your wireless router next. It will then perform brute-force attacks on the login credentials of the router.

Step 3: DNS Credentials Attack

Once Switcher successfully hacks your router login credentials…

…the Trojan changes the router’s DNS settings to connect your network traffic to malicious DNS servers.

DNS stands for Domain Name System. DNS servers match up domain names with their corresponding IP addresses. For example DNS translates www.google.com into 172.217.10.46

DNS hijacking occurs when a cybercriminal points your router DNS settings to his/her rogue DNS server.

Step 4: Profit?

After changing the DNS settings of your router, Switcher awaits connections from nearby devices.Any smartphones or computers that access these rogue DNS servers can now be vulnerable to cyber attacks.

Cybercriminals can carry out:

Phishing scams: When you try to visit a legitimate website through your phone, you might end up visiting a malicious phishing site instead. Phishing sites aim to steal your personal information like login credentials and credit card numbers.
DNS hijacking allows hackers to access traffic coming from your router. Learn more about DNS hijacking below.

Effects of Switcher Trojan on Your Devices

As explained above, Switcher targets routers instead of Android smartphones directly. However, once your router is infected, all phones and computers connected to it are also infected as well.

Effects of Switcher Malware:

Loss of valuable data/information.The hackers can now steal information/data from your phone that travels through your router.
You trying to visit websites you normally would and end up going to phishing sites.
Your devices can now get infected with malware after visiting malicious sites pointed by attackers.

DNS Hijacking: How the Switcher Trojan Controls Your Traffic

Domain Name System (DNS) redirects website names into web addresses. DNS hijacking is often referred as DNS redirection.

DNS hijacking occurs when a hacker redirects the Domain Name System of your router or computer to malicious DNS servers.

Effects of DNS Hijacking

Once DNS settings have been hijacked, anyone trying to visit websites from your router are vulnerable to cyber attacks.

Hackers can now:

Steal your information by redirecting you to malicious phishing sites.
Spy on traffic going through your router
Inject malware into computers/devices that visit infected websites

With Switcher, routers DNS settings are modified so that all traffic going through the router are controlled by hackers.

Signs that your router may be infected with Switcher Trojan

Does your computer feel slow when connecting to your Wi-Fi? Do websites you normally visit often gives you a warning that they may not be safe? If your router has been infected with Switcher, then you may experience these symptoms.

But how can you tell if your router has been hacked with Switcher? Listed below are easy steps on how to tell if your router DNS settings have been modified:

Check Your Router DNS Settings

Verifying your router’s DNS settings is one of the easiest ways to tell if you have been infected with Switcher.

As per cyber security firm Kaspersky Lab, compromised routers with Switcher usually points to one of these IP addresses.

101.200.147.153

112.33.13.11

120.76.249.59

Change Default Router Credentials

Factory default credentials of routers are often the reason why Switchers spreads like wildfire.

If you fail to change the admin username and password of your routers, cyber criminals can quickly gain full admin access to your routers.

Implement strong passwords and regularly update your password every few months.

Update Your Router Firmware to the Latest Build

Exploit vulnerabilities allow malware like Switcher to gain access to your networks.

Router manufacturers releases firmware updates to patch vulnerabilities that are discovered within their systems.

Stay updated with the latest firmware to avoid malware attacks.

Enable 2-Factor Authentication on Router Admin Page

Two-factor authentication or 2FA provides an extra layer of security to your routers admin account.

Setting up 2FA means that cyber criminals would need both your password and second layer of identification to access your router.

How to Avoid Switcher Trojan Attacks

Prevention is better than cure. Below are five easy steps you can do to prevent Switcher malware from infecting your router:

Tip #1: Check Router DNS Settings

The easiest way to tell if your router has been infected is by checking the DNS settings of your router.

Cybersecurity firm Kaspersky Lab has published a list of DNS addresses that are known to be used by Switcher malware.

If your router points to any of these IP addresses, chances are you’ve been infected:

101.200.147.153

112.33.13.11

120.76.249.59

Tip #2: Change your Router Admin Passwords

Many routers are vulnerable to malware attacks because their admins neglect to change factory default usernames and passwords.

Router manufacturers usually create a simple username and password combination so that new users can easily log into their routers admin panel.

Cyber criminals take advantage of these factory credentials. Make sure to:

Change both your admin username and password.
Use strong passwords. Stay away from passwords like PASSWORD1234 or Admin@123.

Tip #3: Keep Your Router Updated (Always Use The Latest Firmware)

Exploit vulnerabilities present in old firmware allows malware like Switcher to gain access to your router.

Router manufacturers usually patch these vulnerabilities by issuing firmware updates.

Always keep your router’s firmware up-to-date by installing the latest updates.

Tip #4: Use Two-Factor Authentication (2FA) When Accessing Your Router Admin Page

Adding an extra layer of security to log into your router will make it harder for attackers to gain full admin access to your network.

Use two-factor authentication if your router admin page allows it.

Tip #5: Get Professional Mobile Security Services

Concerned about the security of your mobile devices and network? Give Cyber Security Hive a call at +91-9901024214 or contact us via email at contactus@cybersecurityhive.com for a free no obligation quote.

Need Mobile Malware Removal Services?

The Switcher Trojan shares similarities with another malware known as DNS Changer. DNS Changer, much like Switcher, modifies the DNS settings of routers and redirects traffic to rogue DNS servers.

DNS Changer was known to target routers from other brands such as D-Link, Net Gear and Pirelli. Switch targets TP-LINK routers specifically.

Contact Cyber Security Hive for Network Security Services

Reach out to us at Cyber Security Hive if you need professional mobile security services. Whether you need Mobile Malware Removal Services or network vulnerability testing, we can help.

Contact Cyber Security Hive at +91-9901024214 to get a free no obligation quote today.

Leave a Reply

Your email address will not be published. Required fields are marked *

Need Help?