December 15, 2016 By Larry Loeb 2 min read

Proofpoint recently discovered a variant of the DNSChanger exploit kit (EK), which is commonly used in malvertising campaigns. The latest version infects physical internet routers through web browsers. But instead of poking holes in a victim’s browser or computer, DNSChanger exploits vulnerabilities in the router itself.

A Router Attack, Rerouted

The method of the attack is fairly sophisticated in execution. It starts when a cybercriminal buys legitimate ad space on a website and posts a file that has been poisoned with JavaScript. At first, the JavaScript simply makes a Web Real-Time Communication (WebRTC) request directed at a Mozilla STUN server that will be able to deliver the victim’s local IP address.

The attacker then tries to determine whether the victim is using a home or small business network. These networks are commonly attached to many vulnerable routers. If the victim’s IP is already known or exists outside the targeted range, he or she will be sent down a decoy path to view a benign, third-party advertisement. This allows the malware to avoid detection.

Hidden Keys

Unlucky victims, however, will be directed to a tainted ad. This .png file has JavaScript-extractable HTML code hidden inside the comment field, which pushes the victim to the landing page of the true exploit. The exploit server then passes the browser a small image.

The EK uses that image to load an Advanced Encryption Standard (AES) key hidden inside the image via steganography. That AES key is used to hide the next commands sent from the command-and-control (C&C) server. The vulnerable router list is then transferred, along with any suggested exploits. The EK looks for them on the network, infecting as it goes.

Once infected, the router serves malicious ads at will. Regardless of the initial infection vector, the malware changes the router’s Domain Name System (DNS) entries and infects any device that connects to it.

Mitigating DNSChanger

According to Bleeping Computer, targeted routers include Linksys, Netgear, D-Link, Comtrend, Pirelli and Zyxel. Users should upgrade their router firmware to the latest version to begin protecting themselves.

It’s not enough to simply use stronger router passwords, since the attack comes through the browser and bypasses all router security. However, users can also be cautious about the ads they click and work to avoid malvertising.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today