Attacks/Breaches

12/11/2018
05:20 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Attackers Using New Exploit Kit to Hijack Home & Small Office Routers

Goal is to steal banking credentials by redirecting users to phishing sites.

Small and home office routers are becoming major targets for criminals seeking to steal banking and other online account credentials belonging to Internet users.

The latest indication of the trend is "Novidade," a dangerous new exploit kit that multiple attack groups appear to be using to target routers belonging to millions of users in Brazil and, to a lesser extent, other parts of the world.

The malware is being used to change Domain Name Service (DNS) settings on routers so all traffic through them is hijacked and routed to a malicious server. When users of Novidade-infected routers attempt to access certain target banks, for instance, their traffic is redirected to cloned versions of the login pages of the bank they are trying to access.

Security vendor Trend Micro has been tracking the threat for some time and estimates that one attack campaign alone has delivered Novidade at least 24 million times since March. Telemetry that the company has obtained suggests that attacks involving the malware may have begun in August 2017.

Most of the attacks have involved attempts to retrieve banking credentials from Internet users in Brazil. But some of the Novidade campaigns have involved targets in no specific geographic location, suggesting either that the attackers are expanding their efforts or that a large group of actors are using the kit, Trend Micro said in a report this week.

Attackers appear to have managed to compromise multiple router models using Novidade, Trend Micro said. Examples include D-Link's DSL-2740R and DIR 905L, Mediabridge's Medialink MWN-WAPR300, Motorola's SBG6580, and TP-Link's TL-WR340G and WR1043ND router models.

"The Novidade exploit kit is another proof point showing that attackers are shifting targets when attacking consumers," says Mark Nunnikhoven, Trend Micro's VP of cloud research. "This malware uses a foothold — your laptop or desktop — to attack the heart of the home network: your router."

By changing a router's DNS settings, attackers can attempt to compromise other devices or phishing credentials at the leisure, Nunnikhoven says.

Novidade is the second major instance in recent months of cybercriminals using malware to change DNS settings on small office and home office (SOHO) routers in order to steal user credentials and conduct other malicious activities.

In August, security vendor Radware reported DNS hijacking attempts targeting Brazilian users of D-Link DSL modems. By October, the campaign had exploded in scope to target users of nearly six-dozen router models in Brazil and elsewhere. China's Qihoo 360's Netlab team, which was the first to report on the increased scope, estimated that as many as 100,000 routers belonging mostly to users in Brazil had been compromised with versions of DNSChanger, a previously known router hijacking tool.

Earlier this year, the FBI warned of foreign cyber actors targeting SOHO routers with VPNFilter, a particularly pernicious malware tool capable of persisting through reboots and rendering infected routers unusable. VPNFilter is believed to have infected some 500,000 SOHO routers worldwide.

Trend Micro described attackers using a variety of methods to distribute Novidade. This includes malvertising, website injections, and instant messages using the 2018 Brazilian presidential elections as a lure. "Once the victim receives and clicks the link to Novidade, the landing page will initially perform several HTTP requests generated by JavaScript Image function to a predefined list of local IP address that are mostly used by routers," the vendor said.

If a connection is successfully established, Novidade then "blindly" attacks the IP address with all its exploits. Next, it tries to log in to the router using default account names and passwords, after which it executes an attack to change the router's DNS settings.

Trend Micro says it has observed a least three variants of Novidade being used in the various attack campaigns. All three variants are delivered the same way and attack routers in the same manner. However, the newer variants have capabilities that the initial variant released in August 2017 did not have.

"The second version of Novidade added obfuscation to the JavaScript component, making it more difficult to detect," Nunnikhoven says. "The third version, continue to refine that obfuscation technique and added the ability to detect the local IP address, setting up the possibility of highly targeted attacks."

The best way for users to mitigate their exposure to threats like Novidade is to ensure their routers have the latest firmware version and are properly patched. Users should also change default usernames and passwords, change the router's default IP address, and disable remote access features so an external actor cannot manipulate it, according to Trend Micro.

Malware like Novidade presents a threat mostly to consumers. In theory, the same conceptual attack could work against enterprises, Nunnikhoven notes. "[But] it's significantly more difficult given the separation of duties and layers of security controls around key assets like Dynamic Host Configuration Protocol (DHCP) servers and enterprise DNS resolution," he says.

Related Content:

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10014
PUBLISHED: 2019-03-24
In DedeCMS 5.7SP2, member/resetpassword.php allows remote authenticated users to reset the passwords of arbitrary users via a modified id parameter, because the key parameter is not properly validated.
CVE-2019-10015
PUBLISHED: 2019-03-24
baigoStudio baigoSSO v3.0.1 allows remote attackers to execute arbitrary PHP code via the first form field of a configuration screen, because this code is written to the BG_SITE_NAME field in the opt_base.inc.php file.
CVE-2019-10017
PUBLISHED: 2019-03-24
CMS Made Simple 2.2.10 has XSS via the advanced_search.php Name field, which is reachable via an "Add a new Profile" action to the File Picker.
CVE-2019-10010
PUBLISHED: 2019-03-24
Cross-site scripting (XSS) vulnerability in the PHP League CommonMark library before 0.18.3 allows remote attackers to insert unsafe links into HTML by using double-encoded HTML entities that are not properly escaped during rendering, a different vulnerability than CVE-2018-20583.
CVE-2019-9978
PUBLISHED: 2019-03-24
The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfare and Social Warfare Pro.