Karlston Posted March 26, 2020 Share Posted March 26, 2020 New attack on home routers sends users to spoofed sites that push malware Attack, which uses DNS hijacking, is the latest to capitalize on pandemic anxiety. Enlarge Wikipedia A recently discovered hack of home and small-office routers is redirecting users to malicious sites that pose as COVID-19 informational resources in an attempt to install malware that steals passwords and cryptocurrency credentials, researchers said on Wednesday. A post published by security firm Bitdefender said the compromises are hitting Linksys routers, although BleepingComputer, which reported the attack two days ago, said the campaign also targets D-Link devices. It remains unclear how attackers are compromising the routers. The researchers, citing data collected from Bitdefender security products, suspect that the hackers are guessing passwords used to secure routers’ remote management console when that feature is turned on. Bitdefender also hypothesized that compromises may be carried out by guessing credentials for users’ Linksys cloud accounts. Not the AWS site you’re looking for The router compromises allow attackers to designate the DNS servers connected devices use. DNS servers use the Internet domain name system to translate domain names into IP addresses so that computers can find the location of sites or servers users are trying to access. By sending devices to DNS servers that provide fraudulent lookups, attackers can redirect people to malicious sites that serve malware or attempt to phish passwords. The malicious DNS servers send targets to the domain they requested. Behind the scenes, however, the sites are spoofed, meaning they’re served from malicious IP addresses, rather than the legitimate IP address used by the domain owner. Liviu Arsene, the Bitdefender researcher who wrote Wednesday's post, told me that spoofed sites close port 443, the Internet gate that transmits traffic protected by HTTPS authentication protections. The closure causes sites to connect over HTTP and in so doing, prevents the display of warnings from browsers or email clients that a TLS certificate is invalid or untrusted. Domains swept into the campaign include: aws.amazon.com goo.gl bit.ly washington.edu imageshack.us ufl.edu disney.com cox.net xhamster.com pubads.g.doubleclick.net tidd.ly redditblog.com fiddler2.com winimage.com The IP addresses serving the malicious DNS lookups are 109.234.35.230 and 94.103.82.249. The malicious-sites users land on claim to offer an app that provides “the latest information and instructions about coronavirus (COVID-19).” Enlarge Bifdefender Users who click on the download button are ultimately redirected to one of several Bitbucket pages that offers a file that installs malware. Known as Oski, the relatively new piece of malware extracts browser credentials, cryptocurrency wallet addresses, and possibly other types of sensitive information. US, Germany, and France most targeted There were 1,193 downloads from one of the four Bitbucket accounts used. With attackers using at least three other Bitbucket accounts, the download number is likely much higher. (The actual number of people infected is probably smaller than the download total, since some people may not have clicked on the installer or accessed the page for research purposes). Bitdefender data shows the attack started on or around March 18 and hit a peak on March 23. Bitdefender data also shows that the routers targeted the most were located in Germany, France, and the United States. At this moment, these countries are among those most suffering the devastating effects of COVID-19, which at the time this post went live had caused more than 436,856 infections and 19,549 deaths worldwide. To prevent attacks on routers, the devices should have remote administration turned off whenever possible. In the event this feature is absolutely necessary, it should be used only by experienced users and protected by a strong password. Cloud accounts—which also make it possible to remotely administer routers—should follow the same guidelines. Moreover, people should frequently ensure that router firmware is up-to-date. People who want to check if they have been targeted can check the Bitdefender post for indicators of compromise. Take note: the indicators may be hard for less experienced users to follow. Source: New attack on home routers sends users to spoofed sites that push malware (Ars Technica) Link to comment Share on other sites More sharing options...
humble3d Posted March 26, 2020 Share Posted March 26, 2020 "Install this app" is enough to fool TOO many people... education should be improved but, higher education is sometimes consumer fraud in and of itself... The US veterans administration has alleged higher education is sometimes consumer fraud and has stopped some payments... How many college graduates do you know who actually work in their college major ? https://www.google.com/search?client=firefox-b-1&q=veterans+administration++has+alleged+higher+education+is+sometimes+consumer+fraud VA to suspend some GI Bill enrollments, holding back more than $200 million from ‘deceptive’ universities https://www.stripes.com/news/veterans/va-to-suspend-some-gi-bill-enrollments-holding-back-more-than-200-million-from-deceptive-universities-1.621827 Fraud and Deceit: What Are They and How Do You Prove It ... https://www.stimmel-law.com/en/articles/fraud-and-deceit-what-are-they-and-how-do-you-prove-it https://books.google.com/books?id=PWVMAQAAIAAJ&pg=PA209&lpg=PA209&dq=in+order+to+maintain+an+action+for+deceit,+it+is+sufficient+to+show+%2B+supreme+court&source=bl&ots=TWb6_hEw5S&sig=ACfU3U0CrO0qOS0JUVpmM_AoFhneK9jfwA&hl=en&sa=X&ved=2ahUKEwjSx7zXibjoAhWLiOAKHQL3AC4Q6AEwAnoECAoQAQ#v=onepage&q=in order to maintain an action for deceit%2C it is sufficient to show %2B supreme court&f=false Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.