Jump to content

Build Theme!
  •  
  • Infected?

WE'RE SURE THAT YOU'LL LOVE US!

Hey there! :wub: Looks like you're enjoying the discussion, but you're not signed up for an account. When you create an account, we remember exactly what you've read, so you always come right back where you left off. You also get notifications, here and via email, whenever new posts are made. You can like posts to share the love. :D Join 93098 other members! Anybody can ask, anybody can answer. Consistently helpful members may be invited to become staff. Here's how it works. Virus cleanup? Start here -> Malware Removal Forum.

Try What the Tech -- It's free!


Photo

Home routers under attack...


  • Please log in to reply
67 replies to this topic

#46 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 01 October 2012 - 01:13 PM

FYI...

DSL modem hack used to infect millions - banking fraud malware
- http://arstechnica.c...s-with-malware/
Oct 1, 2012 - "Millions of Internet users in Brazil have fallen victim to a sustained attack that exploited vulnerabilities in DSL modems, forcing people visiting sites such as Google or Facebook to reach imposter sites that installed malicious software and stole online banking credentials... The attack... infected more than 4.5 million DSL modems, said Kaspersky Lab Expert Fabio Assolini, citing statistics provided by Brazil's Computer Emergency Response Team. The CSRF (cross-site request forgery) vulnerability allowed attackers to use a simple script to steal passwords required to remotely log into and control the devices. The attackers then configured the modems to use malicious domain name system servers that caused users trying to visit popular websites to instead connect to booby-trapped imposter sites. "This is the description of an attack happening in Brazil since 2011 using 1 firmware vulnerability, 2 malicious scripts and 40 malicious DNS servers, which affected 6 hardware manufacturers, resulting in millions of Brazilian internet users falling victim to a sustained and silent mass attack on DSL modems," Assolini wrote... "This enabled the attack to reach network devices belonging to millions of individual and business users, spreading malware and engineering malicious redirects over the course of several months"... The vulnerability is even more alarming since the list of affected manufacturers and models is still unknown. Users who want to protect themselves should make sure their modems are using the latest available firmware, although based on what we know now, there's no guarantee the latest release has been patched against the exploited CSRF flaw."

:ph34r: <_< :ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#47 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 21 January 2013 - 08:43 AM

FYI...

Linksys WRT54GL firmware vuln
- https://secunia.com/advisories/51809/
Release Date: 2013-01-21
Impact: Cross Site Scripting
Where: From remote
Solution Status: Vendor Patch
Operating System: Linksys WRT54GL 4.x
Solution: Update to firmware version 4.30.16.
Original Advisory: Linksys:
http://homedownloads...easeNotes,0.txt

:ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#48 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 07 February 2013 - 10:09 AM

FYI...

D-Link DIR-300 / 600 routers vuln
- https://threatpost.c...bilities-020713
Feb 7, 2013 - "... vulnerabilities in D-Link’s DIR-300 and DIR-600 routers could allow an attacker to inject arbitrary shell commands and ultimately compromise the device... Messner first discovered the vulnerabilities at the tail end of 2012 and forwarded them to D-Link who insisted the issue was relegated to browsers and that the company would not publish a fix. Messner elected to provide more information to D-Link more than a week and a half ago, on January 25. Having still not heard back yet, Messner saw fit to publicly releasing the attack details earlier this week. A post by The H-Security* claims that all current D-Link firmware versions (Version 2.13, released November 7, 2012 and Version 2.14b01, released January 22, 2013) are affected by the flaw and suggests – at least until D-Link issues a fix – to “decommission the affected browsers.” D-Link did not respond to e-mail requests for comment..."

* http://h-online.com/-1798804
6 Feb 2013

- http://atlas.arbor.n...dex#-1154464955
Feb 07, 2013
Analysis: "Many home offices and small offices use broadband connections with devices like the D-Link routers. Such environments don't often have security savvy people on staff, and the compromise of such devices can lead to all sorts of issues such as attackers planting malicious DNS servers in the device configuration that affect every system on the LAN using DHCP to receive DNS settings. In addition, an attacker could use such a vulnerability to penetrate deeper into an enterprise network by compromising a machine on the LAN and backdooring it."

- http://h-online.com/-1800471
8 Feb 2013

- https://secunia.com/advisories/52080/
Release Date: 2013-02-08
Criticality level: Moderately critical
Impact: Exposure of system information, System access
Where: From local network
... weakness, security issues, and vulnerability are reported in the following products:
* D-Link DIR-300 version 2.12 and 2.13.
* D-Link DIR-600 version 2.12b02, 2.13b01, and 2.14b01.
Solution: No official solution is currently available.

:ph34r: :(

Edited by AplusWebMaster, 08 February 2013 - 09:43 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#49 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 01 March 2013 - 05:07 AM

FYI...

D-Link DIR-645 - Firmware v1.03 update-fix
- https://secunia.com/advisories/52432/
Release Date: 2013-03-01
... security issue is reported in version to 1.02. Other versions may also be affected.
Solution: Reportedly fixed in version 1.03.
Original Advisory: http://archives.neoh...13-02/0151.html
"... D-Link has released an updated firmware version (1.03) that addresses this issue..."

> http://www.dlink.com...ome-router-1000
Latest Firmware - Version v1.03

:ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#50 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 19 March 2013 - 08:16 AM

FYI...

Actiontec router MI424WR-GEN3I CSRF vuln ...
- http://www.kb.cert.org/vuls/id/278204
18 Mar 2013 - "Overview: The Verizon FIOS Actiontec router model MI424WR-GEN3I is susceptible to cross-site request forgery attacks.
Solution We are currently unaware of a practical solution to this problem. Please consider the following workarounds.
Restrict Access: Verify the router's web interface is not Internet accessible. As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent CSRF attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing the router web interface using stolen credentials from a blocked network location.
Do Not Stay Logged Into the Router's Management Interface: Always log out of the router's management interface when done using it..."
> http://www.kb.cert.o.../id/BLUU-94HPZA

>> http://www.actiontec...uct.php?pid=189

:ph34r: :ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#51 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 10 April 2013 - 03:22 AM

FYI...

Linksys EA2700 firmware - update
- http://arstechnica.c...emote-takeover/
Apr 9, 2013 - "... The most severe of the vulnerabilities in the "classic firmware" for the Linksys EA2700 Network Manager is a cross-site request forgery weakness in the browser-based administration panel... A statement issued by officials from Belkin, which recently acquired the Linksys brand, said the vulnerabilities documented by Purviance had been fixed in the Linksys Smart Wi-Fi Firmware that was released in June... link for the Linksys Smart Wi-Fi Firmware:
- http://support.links.../routers/EA2700
EA Series Linksys Smart Wi-Fi Firmware
11/19/2012
Ver.1.1.39.145204
- http://downloads.lin...te_11192012.txt

:ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#52 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 16 July 2013 - 10:45 AM

FYI...

ASUS routers - critical updates...
- http://h-online.com/-1918469
16 July 2013 - "... updates are available from the company's support page* for the two router models RT-AC66U and RT-N66U. The company says that it will offer fixes for the other affected models "soon". In the meantime, ASUS recommends turning -off- all AiCloud functions like Cloud Disk, Smart Access and Smart Sync."
* http://www.asus.com/support/

:ph34r: :(

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#53 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 15 October 2013 - 05:52 AM

FYI...

D-Link routers back door vuln...
- http://www.theinquir...ts-wifi-routers
Oct 15 2013 - "... D-Link has hurriedly prepared a patch for WiFi routers that are affected by a recent security alert... In a statement on its website*, D-Link acknowledged the problem and said that it is "proactively working with the sources of these reports". In the meantime, the company has posted an interim firmware update to address the problem... a full fix will be with us by the end of October."
* http://www.dlink.com...upport/security
"... Disable remote access to your router if it is not required (this is disabled by default)... These firmware updates address the security vulnerabilities in affected D-Link routers. D-Link will update this continually and we strongly recommend all users to install the relevant updates..."

- https://isc.sans.edu...l?storyid=16802
Last Updated: 2013-10-14 19:58:28 UTC - "... old d-link routers which allows the attacker to gain admin privileges in the router. The following models are affected:
DIR-100
DI-524
DI-524UP
DI-604S
DI-604UP
DI-604+
TM-G5240
DIR-615 ...
... check this page* to look for information on how to access the admin tool to change the password..."
* http://support.dlink...tools_admin.htm

:ph34r: :ph34r:

Edited by AplusWebMaster, 15 October 2013 - 06:12 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#54 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 02 December 2013 - 03:39 AM

FYI...

D-Link routers - Security Update...
- http://krebsonsecuri...d-link-routers/
Dec 2, 2013 - "... Although the router models affected are fairly old, there are almost certainly plenty of these still in operation, as routers tend to be set-it-and-forget-it devices that rarely get replaced or updated unless they stop working... On Nov. 28, D-Link released a series of updates to fix the problem*..."
* http://www.dlink.com...upport/security
Update on Router Security issue
___

D-Link routers authenticate administrative access using specific User-Agent string
- http://securityadvis...x?name=SAP10001
Last updated: Dec 3, 2013
Rev 9

- https://web.nvd.nist...d=CVE-2013-6026 - 10.0 (HIGH)
"... as exploited in the wild in October 2013."
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 03 December 2013 - 04:04 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#55 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 03 January 2014 - 06:25 AM

FYI...

Linksys router backdoor grants Admin access to Remote Users
- http://www.securityt....com/id/1029551
Jan 3 2014
Impact: User access via network
Version(s): Models WAG200G, WAG320N, WAG54G2, WAG120N, WAP4410N; possibly other models
Description: A vulnerability was reported in several Linksys Routers. A remote user can gain administrative access. A remote user can send specially crafted data to TCP port 32764 to execute commands on the target system with administrative privileges.
The following devices are affected:
Linksys WAG200G
Linksys WAG320N
Linksys WAG54G2
Linksys WAG120N
Linksys WAP4410N
Other Linksys models may be affected.
Routers from other companies may also be affected.
The original advisory is available at:
- https://github.com/elvanderb/TCP-32764
Solution: No solution was available at the time of this entry...

- https://isc.sans.edu...l?storyid=17336
Last Updated: 2014-01-02 22:13:53 UTC

- https://www.grc.com/x/portprobe=32764

- http://atlas.arbor.n...dex#-1412990358
Elevated Severity
16 Jan 2014
An undocumented backdoor in approximately twenty-five types of Cisco Small Business routers has been discovered.
Source: http://www.tripwire....ented-backdoor/
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 16 January 2014 - 08:45 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#56 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 13 February 2014 - 11:44 AM

FYI...

Linksys home routers targeted and compromised in active campaign
- https://net-security...ews.php?id=2707
Feb 13, 2014 - "... undetermined vulnerability affecting certain Linksys WiFi routers is being actively and massively exploited in the wild to infect the devices with a worm dubbed "TheMoon"* ... investigation started after they were notified by a Wyoming-based ISP that some of its customers have had their Linksys routers and home networks -compromised- in the last few days. "The routers, once compromised, scan port 80 and 8080 as fast as they can (saturating bandwidth available)"... it seems that the exploit doesn't work against Linksys' E1200 routers with the latest firmware, but E1000 routers are -vulnerable- even if they have the latest firmware. The worm also attempts to download a "second stage" binary, which includes a set of hard-coded netblocks (probably blocks it scans) and likely instructions for contacting C&C servers. Other files are also ultimately downloaded... Much is yet unknown about the situation, and while the researchers are delving into it, it might be a good idea to update your router's firmware and, if you know how, to switch -off- its remote administration..."
* https://isc.sans.edu...0 Routers/17621

** https://isc.sans.edu... Captured/17630

Upgrading the Linksys router’s firmware ...
- http://kb.linksys.co...&articleid=4030

- http://support.links...t/routers/E1200

- http://support.links...t/routers/E1000
___

What we know so far...
- http://isc.sans.edu/...l?storyid=17633
Last Updated: 2014-02-13 18:37:18 UTC - "... At this point, we are aware of a worm that is spreading among various models of Linksys routers. We do not have a definite list of routers that are vulnerable, but the following routers -may- be vulnerable depending on firmware version: E4200, E3200, E3000, E2500, E2100L, E2000, E1550, E1500, E1200, E1000, E900. The worm will connect first to port 8080, and if necessary using SSL, to request the "/HNAP1/" URL. This will return an XML formatted list of router features and firmware versions. The worm appears to extract the router hardware version and the firmware revision... The worm will connect first to port 8080, and if necessary using SSL, to request the "/HNAP1/" URL. This will return an XML formatted list of router features and firmware versions. The worm appears to extract the router hardware version and the firmware revision... the worm will send an exploit to a vulnerable CGI script running on these routers. The request does not require authentication. The worm sends random "admin" credentials but they are not checked by the script. Linksys (Belkin) is aware of this vulnerability. This second request will launch a simple shell script, that will request the actual worm. The worm is about 2MB in size, samples that we captured so far appear pretty much identical but for a random trailer at the end of the binary... We do not know for sure if there is a command and control channel yet. But the worm appears to include strings that point to a command and control channel. The worm also includes basic HTML pages with images that look benign and more like a calling card. They include images based on the movie "The Moon" which we used as a name for the worm. We call this a "worm" at this point, as all it appears to do is spread. This may be a "bot" if there is a functional command and control channel present..."
(More detail at the ISC URL above.)
___

- https://net-security...ews.php?id=2711
Feb 18, 2014 - "... Administrators and users are advised to -Disable- Remote Administration of their device, which protects them from the attack."
 

xph34r.png.pagespeed.ic.GOH20nhrx_.pngxph34r.png.pagespeed.ic.GOH20nhrx_.png


Edited by AplusWebMaster, 18 February 2014 - 07:34 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#57 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 18 February 2014 - 06:30 AM

FYI...

Linksys EA2700, EA3500, E4200, EA4500 Authentication Bypass ...
- http://www.securityt....com/id/1029769
CVE Reference: https://cve.mitre.or...e=CVE-2013-5122
Feb 17 2014
Impact: User access via network
Version(s): EA2700, EA3500, E4200, EA4500
Description: A vulnerability was reported in some Linksys Routers. A remote user can gain administrative access to the target system...
On some systems, TCP port 443 may also be open.
The vendor was notified in July 2013...
Impact: A remote user can gain administrative access on the target system.
Solution: No solution was available at the time of this entry...
___

- https://secunia.com/advisories/56994/
Release Date: 2014-02-24
Criticality: Highly Critical
Where: From local network
Impact: Security Bypass...
Operating System: Linksys E4200, EA2700, EA3500, EA4500
... vulnerability is currently actively exploited in the wild.
... exploited to gain access to otherwise restricted functionality via TCP port 8083.
Solution: No official solution is currently available.
... Reported as a 0-Day...

- https://www.grc.com/x/portprobe=8083

- https://www.grc.com/x/portprobe=443

- http://support.links.../routers/EA2700
 

xph34r.png.pagespeed.ic.GOH20nhrx_.png


Edited by AplusWebMaster, 24 February 2014 - 10:45 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#58 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 04 March 2014 - 05:03 AM

FYI...

300,000+ wireless routers hijacked by criminals in global attack
- http://www.welivesec...-global-attack/
4 Mar 2014 - "More than 300,000 wireless routers worldwide are under the control of an unknown group of cybercriminals, who have made malicious changes to the devices’ settings, allowing the attackers to misdirect computers to websites of their choice. Ars Technica reports* that the attack, which began in January 2014, affects multiple brands of router, including devices from D-Link, Micronet, Tenda among others. Routers around the world are affected, with many victims in Vietnam, but other affected in Thailand, Colombia and Italy. Team Cymru**, the specialist security company which identified the attack said that the mass  attack was the “latest in a growing trend” of cybercriminals targeting SOHO (small office/home office) routers as a way to target victims without compromising PCs directly..."
* http://arstechnica.c...icious-changes/
"... The telltale sign a router has been compromised is DNS settings that have been changed to 5.45.75.11 and 5.45.76.36..."
** https://www.team-cym...ng&pk_kwd=Media
 

xph34r.png.pagespeed.ic.GOH20nhrx_.pngxph34r.png.pagespeed.ic.GOH20nhrx_.png


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#59 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 06 March 2014 - 06:44 PM

___

Chameleon WiFi Virus spreads ...
- http://blog.malwareb...ds-like-a-cold/
Mar 6, 2014 - "A team of researchers at the University of Liverpool developed a virus dubbed Chameleon that travels over WiFi networks and spreads “as efficiently as the common cold spreads between humans.” Unlike most viruses, Chameleon doesn’t go after computers or internet resources, but focuses on access points (APs), or where you connect to the internet. For the average home user, this is usually a wireless router. The research team says the virus spreads fast, avoiding detection and identifying “the points at which WiFi access is least protected by encryption and passwords.” If the virus hits a roadblock when trying to propagate, it simply looks for other access points “which weren’t strongly protected including open access WiFi points common in locations such as coffee shops and airports”... It’s unfortunate that very few routers today have adequate anti-virus protection, if they have any at all. In addition, many consumers don’t ever change the default username and password on their routers, making it dreadfully susceptible to hijacking. Here are some measures you can take to protect yourself from these types of threats:
• Change the default username and password on your home router
• Ensure your WiFi network is password protected with a strong password
• Avoid weaker wireless authentication protocols like WEP
• Don’t broadcast your network’s name (SSID)
• Avoid public networks and WiFi hotspots
• Consider MAC address filtering to control which devices connect to your network "
- Disable Remote Administration
 

xph34r.png.pagespeed.ic.GOH20nhrx_.pngxph34r.png.pagespeed.ic.GOH20nhrx_.png


Edited by AplusWebMaster, 06 March 2014 - 07:38 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#60 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 21 May 2014 - 08:03 AM

FYI...

When Networks Turn Hostile ...
- http://blog.trendmic...s-turn-hostile/
May 20, 2014 - "We’ve previously discussed how difficult it is to safely connect to networks when on the go... many holiday lodges and hotels today have made Wi-Fi access an integral part of their offered amenities... it is easy to take secure Internet access for granted... using the provided Internet access, the Facebook app on my smartphone refused to connect. Other apps and websites worked fine, however. Trying to access Youtube using the mobile browser resulted in this:
Fake Youtube alert:
> http://blog.trendmic.../05/router1.png
Obviously, the above warning made no sense on an Android device. What would happen if I tried to access Facebook on a PC, then? The same issue occurred – and an off-guard user might not find it suspicious at all:
Fake Facebook alerts:
> http://blog.trendmic.../05/router2.png
> http://blog.trendmic...5/router-2a.png
If the user actually clicked the OK button on either of the two messages the following pages would appear:
Fake Internet Explorer update:
> http://blog.trendmic...20comment04.jpg
Fake Adobe Flash Player update:
> http://blog.trendmic...20comment05.jpg
... Clicking on any part of the site results in a malicious file, detected as TSPY_FAREIT.VAOV, being downloaded and run on the affected system. FAREIT malware is typically used to download other threats onto an affected system. So, how was this done? A little investigation found that the DNS settings had been -modified- so that DNS queries went to a malicious server, that redirected users... The router of the network was a TP-Link TD-W8951ND all-in one modem/router, which combined a DSL modem and a wireless router in just one device. However, this router contains a fairly serious vulnerability: an external user can access the page where the router’s firmware can be upgraded or backed up. However, this firmware file can be easily decoded; once decoded it contains the root password in the very first line... The list of targeted sites was fairly extensive, with more than 600 domains being targeted. Some of the sites targeted (aside from Facebook and Yahoo) include Ask, Bing, Google, Linkedin, Pinterest, and SlideShare. All of these sites used the .com top-level domain...
How do you prevent yourself from becoming a victim of this attack? One suggestion is to explicitly use public DNS servers, such as those of Google (8.8.8.8 and 8.8.4.4). This can usually be done in the operating system’s network settings, and is applicable to both mobile and non-mobile systems... [or OpenDNS 208.67.222.222 and 208.67.220.220]* ... Two settings can also help in reducing the risks from these attacks: first, port 80 should be forwarded to a non-existent IP address. In addition, the web management interface of the router should not be accessible from the WAN side of the network."
* https://store.opendns.com/setup/
___

Multiple Vulnerabilities in SNMP ...
- http://atlas.arbor.net/briefs/
High Severity
May 23, 2014
"... these devices are considered end-of-life, they will likely not receive firmware upgrades addressing these security issues. Metasploit exploit code for these vulnerabilities is available. Attackers often make use of available exploit code for known vulnerabilities to target vulnerable systems..."

Disable SNMP wherever possible, ASAP.


- https://www.grc.com/port_161.htm
"... If our port analysis ever shows that a router (for example) or other network device exposed to the Internet has its SNMP interface open you will want to arrange to disable and close that port immediately..."

Related Ports: https://www.grc.com/port_23.htm
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 28 May 2014 - 02:05 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

Related Topics



0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users