The attackers changed the DNS settings for 180,000 routers: how to protect against an attack?

In recent months, Avast specialists have recorded more than 4.6 million drive-by attacks on Brazilian users’ routers, and about 180,000 of them succeeded: the attackers managed to change the DNS settings of the devices.

Attacks on the routers of Brazilian users began in the summer of 2018; experts from Radware, as well as specialists from the Chinese firm Qihoo 360 were first to discover them.

Modified DNS settings were used to redirect victims to malicious sites every time they use the electronic banking of a number of Brazilian banks.

Later, the campaign expanded, and the attackers began to fake Netflix, Google and PayPal sites, also replacing them with fishing pages.

“By changing the DNS server and accessing some of the targeted domains, we can see that on the fake page, the webservers are unsecured, running on HTTP instead of HTTPS”, — writes Security Research Engineer Mihai Vasilescu.

Now Avast analysts have warned that the attacks are still continuing, and their complexity and scale are only increasing.

According to researchers, majority of routers are hacked while visiting sites with streaming video (these could be sports resources, ports for adults, and so on). Such sites often have malicious ads that identify the IP addresses of the victim’s router, as well as its model. Then begins the default credential search.

Although such attacks usually take some time, most users do not even notice them, as they are busy watching videos.

If the attack succeeds and the credentials are picked up, the malware from the malicious advertisement will change the DNS settings of the device by writing the addresses of the DNS servers controlled by the hackers into the router’s configuration. Basically, the following devices become targets of intruders:

  • TP-Link TL-WR340G
  • TP-Link WR1043ND
  • D-Link DSL-2740R
  • D-Link DIR 905L
  • A-Link WL54AP3 / WL54AP2
  • Medialink MWN-WAPR300
  • Motorola SBG6580
  • Realtron
  • GWR-120
  • Secutech RiS-11/RiS-22/RiS-33

As a result, attackers are able to intercept and redirect user’s traffic to fishing clone sites, show victims advertisements that bring profits to malware operators (DNSChanger has previously used similar tactics) and even implement cryptojacking scripts into traffic.

According to Avast, for such attacks are currently used several special tools: GhostDNS (discovered and described by Radware and Qihoo 360 last year), as well as its variation called Navidade, which appeared in February. In addition, in mid-April, researchers found a set of SonarDNS exploits, built on the basis of the SONAR JS framework.

Researchers note that only in February Novidade tried to infect users’ routers more than 2.6 million times and was used in three active campaigns. In turn, SonarDNS is also seen in at least three campaigns and currently its behavior is very similar to GhostDNS.Recommendation and mitigation:

To prevent a DNS hijack attack, or to protect yourself if you have been infected, we recommend doing the following:

  • Update your router’s firmware to the latest version.
  • Change your login credentials, especially for your online banking services and router, using strong passwords!
  • Make sure to check if your banking website has a valid certificate, by looking for the padlock in the URL address bar of your browser.
Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

About the author

Brendan Smith

Cybersecurity analyst with 15+ years digging into malware and threats, from early days reverse-engineering trojans to leading incident responses for mid-sized firms.

At Gridinsoft, I handle peer-reviewed breakdowns of stuff like AsyncRAT ransomware—last year, my guides helped flag 200+ variants in real scans, cutting cleanup time by 40% for users. Outside, I write hands-on tutorials on howtofix.guide, like step-by-step takedowns of pop-up adware using Wireshark and custom scripts (one post on VT alternatives got 5k reads in a month).

Certified CISSP and CEH, I’ve run webinars for 300+ pros on AI-boosted stealers—always pushing for simple fixes that stick, because nobody has time for 50-page manuals. Tools of the trade: Splunk for hunting, Ansible for automation, and a healthy dose of coffee to outlast the night shifts.

Leave a Reply

Sending