Hacker group incorporates DNS hijacking into its malicious web site marketing campaign

0
284
Hacker group incorporates DNS hijacking into its malicious web site marketing campaign


DNS hijacking concept.
Enlarge / DNS hijacking idea.

Researchers have uncovered a malicious Android app that may tamper with the wi-fi router the contaminated telephone is related to and drive the router to ship all community units to malicious websites.

The malicious app, discovered by Kaspersky, makes use of a method referred to as DNS (Domain Name System) hijacking. Once the app is put in, it connects to the router and makes an attempt to log in to its administrative account through the use of default or generally used credentials, equivalent to admin:admin. When profitable, the app then adjustments the DNS server to a malicious one managed by the attackers. From then on, units on the community may be directed to imposter websites that mimic official ones however unfold malware or log consumer credentials or different delicate data.

Capable of spreading broadly

“We believe that the discovery of this new DNS changer implementation is very important in terms of security,” Kaspersky researchers wrote. “The attacker can use it to manage all communications from devices using a compromised Wi-Fi router with the rogue DNS settings.”

The researchers continued: “Users connect infected Android devices to free/public Wi-Fi in such places as cafes, bars, libraries, hotels, shopping malls, and airports. When connected to a targeted Wi-Fi model with vulnerable settings, the Android malware will compromise the router and affect other devices as well. As a result, it is capable of spreading widely in the targeted regions.”

DNS is the mechanism that matches a website title like ArsTechnica.com to 18.188.231.255, the numerical IP handle the place the positioning is hosted. DNS lookups are carried out by servers operated by a consumer’s ISP or by companies from firms equivalent to Cloudflare or Google. By altering the DNS server handle in a router’s administrative panel from a official one to a malicious one, attackers may cause all units related to the router to obtain malicious area lookups that result in lookalike websites used for cybercrime.

The Android app is called Wroba.o, and has been in use for years in varied nations, together with the US, France, Japan, Germany, Taiwan, and Turkey. Curiously, the DNS hijacking method the malware is able to is getting used nearly solely in South Korea. From 2019 to most of 2022, attackers lured targets to malicious websites that have been despatched by textual content messages, a method referred to as smishing. Late final 12 months, the attackers integrated DNS hijacking into their actions in that Asian nation.

Infection flow with DNS hijacking and smishing.
Enlarge / Infection circulate with DNS hijacking and smishing.

The attackers, recognized within the safety trade as Roaming Mantis, designed the DNS hijacking to work solely when units go to the cellular model of a spoofed web site, most certainly to make sure the marketing campaign goes undetected.

While the menace is critical, it has a serious shortcoming—HTTPS. Transport Layer Security (TLS) certificates that function the underpinning for HTTPS bind a website title equivalent to ArsTechnica.com to a personal encryption key that’s recognized solely to the positioning operator. People directed to a malicious website masquerading as Ars Technica utilizing a contemporary browser will obtain warnings that the connection isn’t safe or can be requested to approve a self-signed certificates, a observe that customers ought to by no means comply with.

Another solution to fight the menace is to make sure the password defending a router’s administrative account is modified from the default one to a powerful one.

Still, not everyone seems to be versed in such finest practices, which leaves them open to visiting a malicious website that appears nearly equivalent to the official one they meant to entry.

“Users with infected Android devices that connect to free or public Wi-Fi networks may spread the malware to other devices on the network if the Wi-Fi network they are connected to is vulnerable,” Thursday’s report said. “Kaspersky consultants are involved concerning the potential for the DNS changer for use to focus on different areas and trigger important points.

LEAVE A REPLY

Please enter your comment!
Please enter your name here