Ongoing DNS Hijack Attack Hits Consumer Modems and Routers
The attack campaigns have re-routed DNS requests through illicit servers in Canada and Russia.
An ongoing DNS hijacking campaign has taken aim at consumer modems and routers. Multiple waves of the campaign have changed settings in the residential devices, sending traffic through any of a series of addresses hosted on services known to be welcoming to hackers and criminals.
In a Bad Packets Report featuring research by Troy Mursch, the details of the three-part (so far) campaign, stretching from late December 2018 through late March of this year, were laid out. In each, the DNS server settings of the router were changed to addresses on services located in Canada or Russia.
According to the report, some 17,000 devices were found to be vulnerable in a BinaryEdge scan. Mursch reports that common reasons for DNS hijacking accounts include advertising fraud and reconnaissance for phishing attacks. In cases where remote enterprise workers are targeted, industrial espionage and IP theft can also come into play.
Mursch recommends that individuals keep devices current on patches and updates and occasionally check the DNS settings of their modems and routers to make sure that the DNS servers used are those provided by the ISP or authorized by the user.
For more, read here.
Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry’s most knowledgeable IT security experts. Check out the Interop agenda here.
Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
More Insights
Read More HERE