Menu
Hackers exploit router flaws in unusual pharming attack

Hackers exploit router flaws in unusual pharming attack

The attack changes the DNS settings of a router using default login credentials, Proofpoint said

An email-based attack spotted in Brazil recently employed an unusual but potent technique to spy on a victim's Web traffic.

The technique exploited security flaws in home routers to gain access to the administrator console. Once there, the hackers changed the routers' DNS (Domain Name System) settings, a type of attack known as pharming.

Pharming is tricky to pull off because it requires access to an ISP's or an organization's DNS servers, which translate domain names into the IP addresses of websites. Those DNS systems are typically well-protected, but home routers often are not.

Security firm Proofpoint wrote in a blog post Thursday that launching the attack via email was a novel approach since pharming is normally a network-based attack.

"This case is striking for several reasons, not the least of which is the introduction of phishing as the attack vector to carry out a compromise traditionally considered purely network-based," the company wrote, adding that it showed "the continued pre-eminence of email as the go-to attack vector for cybercriminals."

A successful pharming attack means users can be diverted to a fraudulent website even when they enter a correct domain name. It also means an attacker can perform a man-in-the-middle attack, such as intercepting email, logins and passwords for websites, and hijacking search results, among other things.

Proofpoint said it detected about 100 phishing emails sent mostly to Brazilians who used either UTStarcom or TR-Link home routers. The emails purported to be from Brazil's largest telecommunications company.

They contained malicious links, and clicking one directed the victim to a server that attacked their router. The server was set up to exploit cross-site request forgery (CSRF) vulnerabilities in routers,

If the attack was successful, the hackers gained access to the administrator control panel of the router. They then entered default login credentials for the device, hoping that the user hadn't changed them

If that worked, they changed the router's setting to their own DNS server. Any computer connected to that router "would potentially have their computer query a malicious DNS server to look up any hostname on the Internet."

Although users are dependent on their router manufacturer to issue patches for CSRF flaws, there is another defense, which is old security advice: change the default password on your router.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags proofpointsecurity

Featured

Slideshows

Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Tech industry comes together as Lexel celebrates turning 30

Tech industry comes together as Lexel celebrates turning 30

Leading figures within the technology industry across New Zealand came together to celebrate 30 years of success for Lexel Systems, at a milestone birthday occasion at St Matthews in the City.​

Tech industry comes together as Lexel celebrates turning 30
HP re-imagines education through Auckland event launch

HP re-imagines education through Auckland event launch

HP New Zealand held an inaugural Evolve Education event at Aotea Centre in Auckland, welcoming over 70 principals, teachers and education experts to explore ways of shaping and enhancing learning using technology.

HP re-imagines education through Auckland event launch
Show Comments