December 15, 2016 By Larry Loeb 2 min read

Proofpoint recently discovered a variant of the DNSChanger exploit kit (EK), which is commonly used in malvertising campaigns. The latest version infects physical internet routers through web browsers. But instead of poking holes in a victim’s browser or computer, DNSChanger exploits vulnerabilities in the router itself.

A Router Attack, Rerouted

The method of the attack is fairly sophisticated in execution. It starts when a cybercriminal buys legitimate ad space on a website and posts a file that has been poisoned with JavaScript. At first, the JavaScript simply makes a Web Real-Time Communication (WebRTC) request directed at a Mozilla STUN server that will be able to deliver the victim’s local IP address.

The attacker then tries to determine whether the victim is using a home or small business network. These networks are commonly attached to many vulnerable routers. If the victim’s IP is already known or exists outside the targeted range, he or she will be sent down a decoy path to view a benign, third-party advertisement. This allows the malware to avoid detection.

Hidden Keys

Unlucky victims, however, will be directed to a tainted ad. This .png file has JavaScript-extractable HTML code hidden inside the comment field, which pushes the victim to the landing page of the true exploit. The exploit server then passes the browser a small image.

The EK uses that image to load an Advanced Encryption Standard (AES) key hidden inside the image via steganography. That AES key is used to hide the next commands sent from the command-and-control (C&C) server. The vulnerable router list is then transferred, along with any suggested exploits. The EK looks for them on the network, infecting as it goes.

Once infected, the router serves malicious ads at will. Regardless of the initial infection vector, the malware changes the router’s Domain Name System (DNS) entries and infects any device that connects to it.

Mitigating DNSChanger

According to Bleeping Computer, targeted routers include Linksys, Netgear, D-Link, Comtrend, Pirelli and Zyxel. Users should upgrade their router firmware to the latest version to begin protecting themselves.

It’s not enough to simply use stronger router passwords, since the attack comes through the browser and bypasses all router security. However, users can also be cautious about the ads they click and work to avoid malvertising.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today