Security researchers warn about a massive attack campaign in which more than 100,000 routers had their DNS settings hijacked to redirect users to phishing websites.
The campaign has been dubbed GhostDNS and has been documented before, including by researchers from Radware in August. However, according to a new report from Qihoo 360’s Netlab, the attackers have significantly ramped up their efforts after Sept. 20, compromising more than 100,000 devices and hijacking traffic to more than 50 websites.
If successful in accessing a router, the scripts change its DNS settings so that it starts using a DNS resolver controlled by the attackers. Since most devices on a local area network rely on the network’s router for DNS resolution, the compromise allows attackers to redirect users to phishing pages when they try to access legitimate websites.
More than 87 percent of the routers compromised by GhostDNS are located in Brazil and the majority of the targeted websites belong to banks, suggesting the attack is primarily financially motivated. However, requests to cloud hosting services and even Netflix are also being hijacked through the rogue DNS server.
“The GhostDNS system poses a real threat to the internet,” the Qihoo Netlab researchers said in their report. “It is highly scaled, utilizes diverse attack vector[s], [and] adopts automated attack process. We recommend the broadband users in Brazil to update their router systems, check if the router’s default DNS server is changed and set more complicated password for router web portal.”
One defense against phishing through DNS hijacking is to always use HTTPS. Attackers shouldn’t be able to obtain legitimate certificates for domains that do not belong to them, so even if they serve a different website to the user’s browser, that session will not be protected through HTTPS.
It’s important for users to verify they are on the correct domain name and to check that the connection is secure by looking for the HTTPS visual indicators in browsers. There are also browser extensions, such as HTTPS Everywhere, that ensure connections to popular websites are always secure.
Meanwhile, website operators can add their sites to the HTTP Strict Transport Security (HSTS) preload list. This will force browsers to only accept HTTPS connections to their domain names, preventing so-called SSL/TLS stripping or downgrade attacks.
Roaming Mantis Mobile Attack Campaign Goes Global
Security researchers warn that a mobile attack campaign dubbed Roaming Mantis that primarily targeted users in Japan and South Korea has now expanded globally and gained support for 27 languages.
Roaming Mantis first appeared on security researchers’ radar in April when it used DNS hijacking through compromised routers to redirect Android users to malicious applications that posed as updates for legitimate apps.
Since then, the attacks have evolved and the hackers are now using multiple distribution methods, including spreading URLs to malicious apps through SMS messages and through documents hosted on the Prezi.com service.
According to a new report by researchers from Kaspersky Lab, the malware now supports 27 languages and this is reflected in the language setting found on victims’ devices. The predominant locale is “en-us” (39 percent), followed by “ko-kr” (18 percent) and “ru” (17 percent). The large number of devices with “en-us” locale might be because people in many countries prefer to use English menus on their phones even though it’s not their native language.
The Roaming Mantis malware is used to direct users to phishing sites and web-based cryptominers. For example, the researchers have recently observed the attackers experimenting with web-based cryptomining for iOS.
“Judging from the list of stolen credentials, the attackers seems to have stolen a large amount of data from victims worldwide,” the Kaspersky researchers said. “This gives us a glimpse of the real scale of the attack, but we believe that this is just a tip of the iceberg.”
“We strongly recommend that Android users turn off the option that allows installation of applications from third-party repositories, to keep their device safe,” the researchers said. “They should also be suspicious if their phones become unusually hot, which may be a side-effect of the hidden cryptomining application in action.”