Categories: Cyber CrimeHacking

SOHO pharming attack hit more that 300,000 devices worldwide

Researchers at Team Cymru published a detailed report on a large scale SOHO pharming attack that hit more that 300,000 devices worldwide.

Another mass compromise of small office/home office (SOHO) wireless routers has been uncovered by researchers from security firm Team Cymru. The hackers adopted different techniques to exploit the numerous flaws discovered in the last months in the principal wireless routers (AsusD-Link, Cisco, Linksys,Micronet,  Netgear,  Tenda, TP-Link).

The vulnerabilities were exploited to change the network setting for more than 300,000 SOHO wireless routers, making changes to DNS attackers were able to redirect users to malicious servers controlled by attackers.

A few weeks ago The Polish Computer Emergency Response Team has documented a series of cyber attacks observed in Poland involved cybercriminals hacking into home routers and changing their DNS settings so they can conduct MITM attacks on online banking connection. The techniques could be used to target also users from other countries and exploits several vulnerabilities in home routers, with this method the attackers configured routers to use a DNS server under their control to respond to rogue IP addresses to DNS queries for the domain names they have targeted.

The router “pharming” campaign unrevealed by Team Cymru seems to be distinct from the attacks spotted by Polish CERT, it involved a greater number of machines in a wider geographic area.

“The affected devices we observed were vulnerable to multiple exploit techniques, including a recently disclosed authentication bypass vulnerability in ZyXEL Cirmware and Cross-Site Request Forgery (CSRF) techniques similar to those reported in late 2013. “

“This large-scale attack has similarities with a recent, highly targeted attack against Polish consumer bank customers, though subtle differences in tradecraft point to these being separate campaigns. We also believe that this activity is separate from the Linksys Moon worm recently reported by the SANS Institute.”  reported the executive summary of SOHO pharming report.

The attackers also exploited CSRF techniques to change WPA/WPA2 passwords for SOHO devices and other settings to gain complete remote control of the wireless routers.

To discover if we SOHO device has been compromised, it is possible to verify the DNS settings, affected devices use the IP addresses 5.45.75.11 and 5.45.75.36. The analysis of the experts at Team Cymru revealed that the majority of affected SOHO devices is located in Vietnam, Columbia, India and Thailand and unfortunately my country Italy.

Through the change of DNS setting an attacker could redirect users to a website used to steal banking credentials or to serve a malware.

” suggests a more traditional criminal intent, such as search result redirection, replacing advertisements, or installing drive-by downloads; all activities that need to be done on a large scale for profitability,”  “The more manually intensive bank account transfers seen in Poland would be difficult to conduct against such a large and geographically-disparate victim group.”

This kind of attacks are very dangerous also considering because they target weaknesses in SOHO devices running embedded software.

“As embedded systems begin to proliferate in both corporate and consumer networks, greater attention needs to be given to what vulnerabilities these devices introduce,” “Security for these devices is typically a secondary concern to cost and usability and has traditionally been overlooked by both manufacturers and consumers.” reported the Team Cymru.

To protect SOHO devices from the attack disable any type of remote administration access from the Internet and change default usernames and passwords. Be sure to install the latest-available version of the firmware for your SOHO devices.

Please read the report and share it!

Pierluigi Paganini

(Security Affairs –  SOHO wireless routes, hacking)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Ex-NSA employee sentenced to 262 months in prison for attempting to transfer classified documents to Russia

A former U.S. NSA employee has been sentenced to nearly 22 years in prison for…

4 hours ago

Cuttlefish malware targets enterprise-grade SOHO routers

A new malware named Cuttlefish targets enterprise-grade and small office/home office (SOHO) routers to harvest…

4 hours ago

A flaw in the R programming language could allow code execution

A flaw in the R programming language enables the execution of arbitrary code when parsing…

6 hours ago

Muddling Meerkat, a mysterious DNS Operation involving China’s Great Firewall

The China-linked threat actors Muddling Meerkat are manipulating DNS to probe networks globally since 2019.…

14 hours ago

Notorious Finnish Hacker sentenced to more than six years in prison

Finnish hacker was sentenced to more than six years in prison for hacking into an…

1 day ago

CISA guidelines to protect critical infrastructure against AI-based threats

The US government’s cybersecurity agency CISA published a series of guidelines to protect critical infrastructure…

1 day ago

This website uses cookies.