-->
Dnschanger Malware Is Back! Hijacking Routers To Target Every Connected Device

Dnschanger Malware Is Back! Hijacking Routers To Target Every Connected Device

Dnschanger Malware Is Back! Hijacking Routers To Target Every Connected Device

 Next fourth dimension when you lot meet an promotion of your favorite duo of shoes on whatever website DNSChanger Malware is Back! Hijacking Routers to Target Every Connected Device
Next fourth dimension when you lot meet an promotion of your favorite duo of shoes on whatever website, fifty-fifty if it is legitimate, only DO NOT CLICK ON IT.

…Because that advertising could infect you lot inward such a agency that non only your system, but every device connected to your network would larn affected.

H5N1 few days ago, nosotros reported nigh a novel exploit kit, dubbed Stegano, that hides malicious code inward the pixels of banner advertisements rotating on several high profile tidings websites.

Now, researchers conduct maintain discovered that attackers are targeting online users amongst an exploit kit called DNSChanger that is beingness distributed via advertisements that enshroud malicious code inward icon data.

Remember DNSChanger? Yes, the same malware that infected millions of computers across the the world inward 2012.

DNSChanger industrial plant past times changing DNS server entries inward infected computers to betoken to malicious servers nether the command of the attackers, rather than the DNS servers provided past times whatever Internet access provider or organization.

So, whenever a user of an infected scheme looked upwards a website on the Internet (say, facebook.com), the malicious DNS server tells you lot to become to, say, a phishing site. Attackers could every bit good inject ads, redirect search results, or sweat to install drive-by downloads.

The most worrisome endure is that hackers conduct maintain combined both threats inward their recent widespread malvertising campaign, where DNSChanger malware is beingness spread using Stegno technique, in addition to in i trial it hitting your system, instead of infecting your PC, it takes command of your unsecured routers.

Researchers at Proofpoint conduct maintain discovered this unique DNSChanger exploit kit on to a greater extent than than 166 router models. The kit is unique because the malware inward it does non target browsers, rather it targets routers that run unpatched firmware or are secured amongst weak admin passwords.

Here's How the Attack Works:

 Next fourth dimension when you lot meet an promotion of your favorite duo of shoes on whatever website DNSChanger Malware is Back! Hijacking Routers to Target Every Connected Device
Firstly, the ads on mainstream websites hiding malicious code inward icon information redirects victims to spider web pages hosting the DNSChanger exploit kit. The exploit kit in addition to thence targets unsecured routers.

Once the router is compromised, the DNSChanger malware configures itself to utilisation an attacker-controlled DNS server, causing most computers in addition to devices on the network to catch malicious servers, rather than those corresponding to their official domain.

Those ads containing malicious JavaScript code reveals a user's local IP address past times triggering a WebRTC asking (the spider web communication protocol) to a Mozilla STUN (Session Traversal Utilities for NAT) server.

STUN server in addition to thence ship a ping dorsum containing the IP address in addition to port of the client. If the target's IP address is inside a targeted range, the target receives a mistaken advertizing hiding exploit code inward the metadata of a PNG image.

The malicious code eventually redirects the visitor to a spider web page hosting DNSChanger, which uses the Chrome browser for Windows in addition to Android to serve a 2nd icon concealed amongst the router exploit code.

"This laid upwards on is determined past times the detail router model that is detected during the reconnaissance phase," a Proofpoint researcher wrote inward a blog post. "If in that place is no known exploit, the laid upwards on volition sweat to utilisation default credentials."

List of Routers Affected


The laid upwards on in addition to thence cloaks traffic in addition to compares the accessed router against 166 fingerprints used to attain upwards one's hear if a target is using vulnerable router model. According to researchers, around of the vulnerable routers include:

  • D-Link DSL-2740R
  • NetGear WNDR3400v3 (and probable other models inward this series)
  • Netgear R6200
  • COMTREND ADSL Router CT-5367 C01_R12
  • Pirelli ADSL2/2+ Wireless Router P.DGA4001N

It is non clear at the instant that how many people conduct maintain been exposed to the malicious ads or how long the crusade has been running, but Proofpoint said the attackers behind the crusade conduct maintain previously been responsible for infecting to a greater extent than than 1 1000000 people a day.

Proofpoint did non break the name of whatever advertizing network or website displaying the malicious advertisements.

Users are advised to ensure that their routers are running the latest version of the firmware in addition to are protected amongst a rigid password. They tin flame every bit good disable remote administration, modify its default local IP address, in addition to hardcode a trusted DNS server into the operating scheme network settings.
Blogger
Disqus
Pilih Sistem Komentar

No comments

Advertiser