Malvertising hits routers instead of computers

New Malvertising Attack: DNSChanger exploit kit is back more effective than ever. The new DNSChanger is widely used for malicious attacks targeting home routers. We should emphasize that home routers are used by many ...

According to Proofpoint researchers, the main target of attackers is DNS records in the target. This way all queries go through the attacker's DNS servers.

What is the benefit of malvertising for invaders?

Victims are served with ads that bring money to the attackers. Of course, malicious actions do not stop in distributing ads.

"When attackers take control of a DNS server on a network, they can carry out a wide range of malicious actions on devices connected to the network. These include bank fraud, man-in-the-middle attacks, phishing, ad fraud, and more. In this case, the DNSChanger exploit kit allows attackers to use the internet router itself, "said Proofpoint researcher Kafeine.

How does this Malvertising attack work?

It all starts with ads found on legitimate websites. When served to a potential victim, they ping the attackers server offering it, the local its IP.

If the IP address is already known or does not exist in the targeted areas, the user is served with a legitimate ad and the attack stops there.

However, if the IP addresses the attacker's requirements, a malicious ad (a PNG file) containing HTML code that redirects the victims into the destination page of the DNSChanger exploit kit is served to the victim. There are some JavaScript that start running various functions.

After checking the IP address (once again), the DNSChanger exploit kit loads multiple functions and an AES key that is concealed in a small image.

"This key will be used to decrypt the list of [router] fingerprints," says Kafeine. "Then with the victim browser, malicious users will try to locate the router used on the network."

The results were sent back to the exploit kit, which then sends instructions on how this particular router model can be violated.

Once the router has been compromised, the DNS settings are changed. So attackers can intercept traffic from some big advertising companies.

Malvertising

How to protect yourself?

The list of routers that includes the exploit kit is great, and potentially vulnerable router models are not easy to detect.

"The safest approach for end users is to assume that all known exploits are contained in this exploit kit, and thus all routers should be updated to the latest known firmware," advises Kafeine. Of course, if the manufacturers do not have secure firmware available that is another .

If you also use ad blocking software, you can minimize the risk of being infected by malicious advertising campaigns.

According to Caffeine, the current campaign is targeting Chrome users on Windows computers and Android devices.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).