Friday, October 4, 2024
HomeDNSHackers Hijack Home Routers & Change The DNS Settings to Implant Infostealer...

Hackers Hijack Home Routers & Change The DNS Settings to Implant Infostealer Malware

Published on

Researchers discovered a new form of attack that targeted home routers and altered the DNS settings to redirect the victims to a malicious website that delivers the infostealer malware called “Osk” which seems to have emerged in late 2019.

Landing websites are posing with information about the Coronavirus pandemic and force victims to download the app that promises victims to provide “the latest information and instructions about coronavirus (COVID-19)” through the app.

COVID-19 Theme is nowadays badly abused to trap victims using phishing attacks and exploit the victims to steal sensitive data.

- Advertisement - EHA

Attackers also use Bitbucket, the popular web-based version control repository hosting service to store the malicious payload, and the Popular URL shorten service TinyURL to hide the link that redirects users to reach the Bitbucket.

Researchers from Bitdefender reported the following key finding of this attack

1.Mostly targets Linksys routers, bruteforcing remote 
management credentials
2. Hijacks routers and alters their DNS IP addresses
3. Redirects a specific list of webpages/domains to a
malicious Coronavirus-themed webpage
4. Uses Bitbucket to store malware samples
5. Uses TinyURL to hide Bitbucket link
6 . Drops Oski inforstealer malware

Compromising The Routers

The attacker probes the internet to find the vulnerable home router to perform the password brute-forcing attack and change the DNS IP settings.

DNS setting is playing an important role in resolving the right IP address to the corresponding domain names.

If the attackers change the DNS IP addresses from the targeted routers, it resolves the user request to any web page that is controlled by the attacker.

The following list of the domain is targetted in this campaign:

  • aws.amazon.com”
  • “goo.gl”
  • “bit.ly”
  • “washington.edu”
  • “imageshack.us”
  • “ufl.edu”
  • “disney.com”
  • “cox.net”
  • “xhamster.com”
  • “pubads.g.doubleclick.net”
  • “tidd.ly”
  • “redditblog.com”
  • “fiddler2.com”
  • “winimage.com”

Users will be redirected to the IP addresses ( 176.113.81.159, 193.178.169.148, 95.216.164.181 ) If the traffic passes through the compromised router and the user will try to reach the above domains.

Changing the DNS settings never raises any red flag and users would believe they’ve landed on a legitimate webpage other than a different IP address.

“The webpages display a message purportedly from the World Health Organization, telling users to download and install an application that offers instructions and information about COVID-19,” Bitdefender said.

The attacker set the initial hyperlink to https://google.com/chrome which is a clean and well-known domain, but actually, an “on-click” event is set that changes the URL to the malicious one which is hidden with TinyURL.

Once victims click the download button, a malicious file drops from the Bitbucket repository but the victims are completely unaware of it.

“In the final stage of the attack, a malicious file packed with MPRESS is downloaded. This payload is the Oski stealer that communicates with a C&C server for uploading the stolen information.”

Bitdefender telemetry observed that most of the targeted vulnerable routers attempted to exploit were located in Germany, France, and the United States.

Also Read: What is DNS Attack and How Does it Work?

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Microsoft, DOJ Dismantle Domains Used by Russian FSB-Linked Hacking Group

Microsoft and the U.S. Department of Justice (DOJ) have successfully dismantled a network of...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system...

Linux Malware perfctl Attacking Millions of Linux Servers

Researchers have uncovered a sophisticated Linux malware, dubbed "perfctl," actively targeting millions of Linux...

Doppler Launches ‘Change Requests’ to Strengthen Secrets Management Security with Audited Approvals

Doppler, the leading platform in secrets management, today announces the launch of Change Requests,...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

DCRAt Attacking Users Via HTML Smuggling To Steal Login Credentials

In a new campaign that is aimed at users who speak Russian, the modular...

LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution

The LummaC2 obfuscator employs a novel control flow protection scheme designed specifically for its...

Octo2 Android Malware Attacking To Steal Banking Credentials

The original threat actor behind the Octo malware family has released a new variant,...