Friday, March 29, 2024

Hackers Hijacked More Than 100,000 Routers DNS Settings and Redirecting Users to Malicious WebSites

Hackers hijacked 100,000+ Routers and modified their DNS settings to redirect their DNS requests through malicious DNS servers to steal banking credentials.

The DNSChanger campaign named GhostDNS appears to be starting from September 20, 2018, and it grows significantly by adding a bunch of new scanners. The campaign attempts a brute force on the router’s web page or bypass authentication using dnscfg.cgi exploit.

The malicious campaign primarily focuses on Brazil, according to Netlab’s report more than 100k+ routers infected (87.8% located in Brazil), and 70+ router/firmware have been involved, and 50+ domain names such as some big banks in Brazil and even Netflix.

GhostDNS Hijacked 100,000+ Routers

The GhostDNS is made up of four different parts DNSChanger Module, Phishing Web module, Web Admin module, Rogue DNS module.

GhostDNS

DNSChanger Module

The module is responsible for information collection and carries out attack by using three DNSChanger sub-modules against the routers on both internet and intranet networks. This DNS changer module consists of 100+ attack scripts that affecting 70+ different routers.

GhostDNS

While examing one of the sub-module PyPhp DNSChanger which contains 69 attack scripts against 47 different routers/firmware, Netlab discovered some statistics information which shows this particular module itself infected more than 62,00 routers.

GhostDNS

Web Admin

Researchers found the admin panel in one of the PyPhp DNSChanger node contains the login page of the Web Admin System.

Rogue DNS module

The Rouge DNS server contains a number of hijacked domains, primarily banking domains, cloud hosting services, and domain belongs to security company Avira.

Phishing Web module

The rogue DNS server hijacks targeted domain’s and resolves them to phishing server and the phishing server servers corresponding phishing site.

With this ghosts campaign between 09-21 to 09-27, the hackers primarily targeted users located in Brazil.

GhostDNS

Netlab says GhostDNS system poses a real threat to the Internet. It is highly scaled, utilizes diverse attack vector, adopts automated attack process.

Related read

Hackers Hijacked 7,500+ MikroTik Routers and Redirecting User Traffic to Attackers

Hackers Hijacking DLink Routers to Gain Bank Credentials By Using Various Router Exploits

Hackers Attack Over 200,000 MikroTik Routers & Infected with Mass Coinhive Cryptojacking Malware

Website

Latest articles

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles