The new attack that being launched by cyber criminals against DrayTek Routers where they could Exploiting zero-day Vulnerability to change DNS settings of routers.
Taiwan based DrayTek Provides broadband routers series serve any Ethernet-based Internet feeds for home and business networks which enables WAN failover, load-balancing, Bandwidth Management, Firewall, VPN features are available in most models.
Most of the users are reporting that their DrayTek Router DNS settings changed but the Syslog show that no one signed on.
Researcher believes that attacker possibly compromised the Router using brute force attack or they exploiting the zero-day vulnerability.
Successfully compromised routers administration session has been hijacked by an attacker then DNS settings are being altered and redirected to an unknown server located at the Specific server. 38.134.121.95.
In this case, Some of the compromised users reported that they have already changed their default password even though their DNS setting being alternated.
DrayTek has confirmed that there is an issue with their routers So the attack was being targeted by exploiting the Zero-day.
When we analyzed the shodan search and it reveals that there are more than 800,000 DrayTek devices currently running around the world and vulnerable to this new attack,
DrayTek released a security advisory for the its user to protect their router and it warned that, “We are in the process of releasing updated firmware which you should upgrade to as soon as it is available “
Check your DNS and DHCP settings on your router. If you have a router supporting multiple LAN subnets, check settings for each subnet.
Your DNS settings should be either blank, set to the correct DNS server addresses from your ISP or DNS server addresses of a server which you have deliberately set (e.g. Google 8.8.8.8). A known rogue DNS server is 38.134.121.95 – if you see that, your router has been changed.
Along with this warning, DrayTek advised following the various instruction to protect the users from being compromised by new attacks against web-enabled devices.
Also, users should check whether DNS settings are being altered and they are in the process of producing and issuing new firmware and a user should install that as soon as possible.
Until then users can check the routers DNS settings on your router and correct them if changed. also, users need to disable the remote admin unless needed and recommend only using secured (TLS1.2) connections for web admin (for local and remote admin).
Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…
Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack…
The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in…
A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto…
Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly based…
A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves…