Hexbyte – Tech News – Ars Technica | In-the-wild router exploit sends unwitting users to fake banking site

Hexbyte – Tech News – Ars Technica |

SWITCHAROO —

DLink vulnerability lets attackers remotely change DNS server settings.


DLink

Hackers have been exploiting a vulnerability in DLink modem routers to send people to a fake banking website that attempts to steal their login credentials, a security researcher said Friday.

The vulnerability works against DLink DSL-2740R, DSL-2640B, DSL-2780B, DSL-2730B, and DSL-526B models that haven’t been patched in the past two years. As described in disclosures here, here, here, here, and here, the flaw allows attackers to remotely change the DNS server that connected computers use to translate domain names into IP addresses.

According to an advisory published Friday morning by security firm Radware, hackers have been exploiting the vulnerability to send people trying to visit two Brazilian bank sites—Banco de Brasil’s www.bb.com.br and Unibanco’s www.itau.com.br—to malicious servers rather than the ones operated by the financial institutions. In the advisory, Radware researcher Pascal Geenens wrote:

The attack is insidious in the sense that a user is completely unaware of the change. The hijacking works without crafting or changing URLs in the user’s browser. A user can use any browser and his/her regular shortcuts, he or she can type in the URL manually or even use it from mobile devices such as iPhone, iPad, Android phones or tablets. He or she will still be sent to the malicious website instead of to their requested website, so the hijacking effectively works at the gateway level.

Hexbyte – Tech News – Ars Technica | Convincing spoof

Geenens told Ars that Banco de Brasil’s website can be accessed over unencrypted and unauthenticated HTTP connections, and that prevented visitors from receiving any warning the redirected site was malicious. People who connected using the more secure HTTPS protocol received a warning from the browser that the digital certificate was self-signed, but they may have been tricked into clicking an option to accept it. Other than the self-signed c

Read More