New Drive-By Attack Taking Over Home Routers
Researchers at Symantec are warning users that if they haven't changed the default password on their home wireless router, they should finally just DO IT.
Researchers at Symantec are warning users that if they haven't changed the default password on their home wireless router, they should finally just DO IT.
Symantec's Zulfikar Ramzan issued a warning Thursday that hackers are lacing phony Web sites with malicious code that actually will log into and mess with your home broadband router. He's coined a term for it: Drive-By Pharming."I believe this attack has serious widespread implications and affects many millions of users worldwide," wrote Ramzan in his blog on Symantec's Security Response Weblog Thursday morning. "Fortunately, this attack is easy to defend against, as well." Now, here's the thing. How long have security types been telling us to be smart about our passwords, whether the passwords are for our laptops, our smartphones, or our home routers? It's not a new call to arms. But, obviously, it's one we all need to hear again.
Here's how Ramzan, and his fellow researchers, Sid Stamm and Markus Jakobsson of the Indiana University School of Informatics, say the new problem goes: Attackers build a fraudulent Web page that, simply when viewed, results in substantive configuration changes to your home broadband router or wireless access point. They add malicious JavaScript code to the page.
"When the Web page is viewed, this code, running in the context of your Web browser, uses a technique known as 'Cross Site Request Forgery' and logs into your local home broadband router," explains Ramzan. "Now, most such routers require a password for logging in. However, most people never change this password from the original factory default. Upon successful login, the JavaScript code changes the router's settings. One simple, but devastating, change is to the user's DNS server settings."
Once they mess with your router, the attackers have control over it, allowing them to direct you and your browser to whatever Web sites they choose. You may want to go to, say, Hack in the Box but, instead, you'll go to whatever site they want to send you to. (For more technical details about the attack, check out Ramzan's blog.)
Think about it. That could be bad. If you have kids using your home computer, do you suddenly want a hacker in charge of what Web site they're going to? It also can be dangerous. You could be surreptitiously diverted to another fraudulent Web site where you might divulge personal financial information, be infected by another round of Trojans, or unknowingly hand out critical company information.
So, it's another reminder to be smart about our passwords. I, myself, could be smarter about them. I'm trying but I still need to be better. Ramzan's warning serves as a good lesson about a new kind of attack, and a good reminder.
About the Author
You May Also Like
A Cyber Pros' Guide to Navigating Emerging Privacy Regulation
Dec 10, 2024Identifying the Cybersecurity Metrics that Actually Matter
Dec 11, 2024The Current State of AI Adoption in Cybersecurity, Including its Opportunities
Dec 12, 2024Cybersecurity Day: How to Automate Security Analytics with AI and ML
Dec 17, 2024The Dirt on ROT Data
Dec 18, 2024