News Security Management
New DNS Trojan Hacks Home Routers
Researchers discover new variant of DNSChanger that changes DNS settings in home routers
A newly discovered Trojan in the wild hacks into home wireless routers and changes their DNS settings to point to the attackers rogue DNS server. The malware is a new variant of the DNSChanger Trojan that has been circulating around the Internet, according to researchers at Secure Computing who have been studying it.
More Security Insights
- IDC Analyst Connection: Using Blade Systems to Cut Costs and Sharpen Efficiencies
- Cloud-based data backup: A buyer's guide - How to choose a third-party provider for development, management of your data backup solution
- The Untapped Potential of Mobile Apps for Commercial Customers
- Augment your data warehouse with big data solutions
Home routers make easy prey because many users dont lock them down, and even use their default passwords for authentication. Theres been plenty of research in this space over the past year, everything from drive-by hacks to botnet infections to DNS rebinding. (See Attackers Use New 'Call-Home' Method to Infiltrate Home Networks and RSA Session Features Live Linksys Router Hack and The Hack Your Home Router Challenge.)
Sven Krasser, director of data mining research for Secure Computing, says the new DNSChanger Trojan attack also indirectly infects any machine that connects to the router. This is the first time weve seen on [a] wide basis that the computing resources of the wireless router are part of the attack, he says. It also [affects] machines that are not directly exploited -- ones that are connecting to the router.
The Trojan executes brute-force attacks on the Web interface of a router that only uses basic authentication -- and its mostly going after D-Link and Linksys routers so far, according to Krasser.
Secure Computing says the attackers behind the malware are the infamous Zlob malware authors.
Krasser says the attackers can send a victim to any Website, and most times return the correct site back to the user to evade detection. Other times they redirect a user to their own spoofed pages, he says. He says phishing is a likely goal of the attackers.
He says its possible that attackers could kick the attack up a notch and add put their malcode onto the routers, such as zombie code. Secure Computing researchers have posted some screen shots and an analysis of the Trojan in their blog.
Never use default passwords in home routers, Krasser says, and keep it updated.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.