Hackers Hijacked More Than 100,000 Routers DNS Settings and Redirecting Users to Malicious WebSites

Hackers hijacked 100,000+ Routers and modified their DNS settings to redirect their DNS requests through malicious DNS servers to steal banking credentials.

The DNSChanger campaign named GhostDNS appears to be starting from September 20, 2018, and it grows significantly by adding a bunch of new scanners. The campaign attempts a brute force on the router’s web page or bypass authentication using dnscfg.cgi exploit.

The malicious campaign primarily focuses on Brazil, according to Netlab’s report more than 100k+ routers infected (87.8% located in Brazil), and 70+ router/firmware have been involved, and 50+ domain names such as some big banks in Brazil and even Netflix.

GhostDNS Hijacked 100,000+ Routers

The GhostDNS is made up of four different parts DNSChanger Module, Phishing Web module, Web Admin module, Rogue DNS module.

DNSChanger Module

The module is responsible for information collection and carries out attack by using three DNSChanger sub-modules against the routers on both internet and intranet networks. This DNS changer module consists of 100+ attack scripts that affecting 70+ different routers.

While examing one of the sub-module PyPhp DNSChanger which contains 69 attack scripts against 47 different routers/firmware, Netlab discovered some statistics information which shows this particular module itself infected more than 62,00 routers.

Web Admin

Researchers found the admin panel in one of the PyPhp DNSChanger node contains the login page of the Web Admin System.

Rogue DNS module

The Rouge DNS server contains a number of hijacked domains, primarily banking domains, cloud hosting services, and domain belongs to security company Avira.

Phishing Web module

The rogue DNS server hijacks targeted domain’s and resolves them to phishing server and the phishing server servers corresponding phishing site.

With this ghosts campaign between 09-21 to 09-27, the hackers primarily targeted users located in Brazil.

Netlab says GhostDNS system poses a real threat to the Internet. It is highly scaled, utilizes diverse attack vector, adopts automated attack process.

Related read

Hackers Hijacked 7,500+ MikroTik Routers and Redirecting User Traffic to Attackers

Hackers Hijacking DLink Routers to Gain Bank Credentials By Using Various Router Exploits

Hackers Attack Over 200,000 MikroTik Routers & Infected with Mass Coinhive Cryptojacking Malware

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Node.js systeminformation Package Vulnerability Exposes Millions of Systems to RCE Attacks

A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing millions…

21 hours ago

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through…

2 days ago

BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques

An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the initial…

2 days ago

Malicious Apps On Amazon Appstore Records Screen And Interecpt OTP Verifications

A seemingly benign health app, "BMI CalculationVsn," was found on the Amazon App Store, which…

2 days ago

Lazarus Hackers Using New VNC Based Malware To Attack Organizations Worldwide

The Lazarus Group has recently employed a sophisticated attack, dubbed "Operation DreamJob," to target employees…

2 days ago

New Python NodeStealer Attacking Facebook Business To Steal Login Credentials

NodeStealer, initially a JavaScript-based malware, has evolved into a more sophisticated Python-based threat that targets…

2 days ago