Categories: Cyber CrimeHacking

SOHO pharming attack hit more that 300,000 devices worldwide

Researchers at Team Cymru published a detailed report on a large scale SOHO pharming attack that hit more that 300,000 devices worldwide.

Another mass compromise of small office/home office (SOHO) wireless routers has been uncovered by researchers from security firm Team Cymru. The hackers adopted different techniques to exploit the numerous flaws discovered in the last months in the principal wireless routers (AsusD-Link, Cisco, Linksys,Micronet,  Netgear,  Tenda, TP-Link).

The vulnerabilities were exploited to change the network setting for more than 300,000 SOHO wireless routers, making changes to DNS attackers were able to redirect users to malicious servers controlled by attackers.

A few weeks ago The Polish Computer Emergency Response Team has documented a series of cyber attacks observed in Poland involved cybercriminals hacking into home routers and changing their DNS settings so they can conduct MITM attacks on online banking connection. The techniques could be used to target also users from other countries and exploits several vulnerabilities in home routers, with this method the attackers configured routers to use a DNS server under their control to respond to rogue IP addresses to DNS queries for the domain names they have targeted.

The router “pharming” campaign unrevealed by Team Cymru seems to be distinct from the attacks spotted by Polish CERT, it involved a greater number of machines in a wider geographic area.

“The affected devices we observed were vulnerable to multiple exploit techniques, including a recently disclosed authentication bypass vulnerability in ZyXEL Cirmware and Cross-Site Request Forgery (CSRF) techniques similar to those reported in late 2013. “

“This large-scale attack has similarities with a recent, highly targeted attack against Polish consumer bank customers, though subtle differences in tradecraft point to these being separate campaigns. We also believe that this activity is separate from the Linksys Moon worm recently reported by the SANS Institute.”  reported the executive summary of SOHO pharming report.

The attackers also exploited CSRF techniques to change WPA/WPA2 passwords for SOHO devices and other settings to gain complete remote control of the wireless routers.

To discover if we SOHO device has been compromised, it is possible to verify the DNS settings, affected devices use the IP addresses 5.45.75.11 and 5.45.75.36. The analysis of the experts at Team Cymru revealed that the majority of affected SOHO devices is located in Vietnam, Columbia, India and Thailand and unfortunately my country Italy.

Through the change of DNS setting an attacker could redirect users to a website used to steal banking credentials or to serve a malware.

” suggests a more traditional criminal intent, such as search result redirection, replacing advertisements, or installing drive-by downloads; all activities that need to be done on a large scale for profitability,”  “The more manually intensive bank account transfers seen in Poland would be difficult to conduct against such a large and geographically-disparate victim group.”

This kind of attacks are very dangerous also considering because they target weaknesses in SOHO devices running embedded software.

“As embedded systems begin to proliferate in both corporate and consumer networks, greater attention needs to be given to what vulnerabilities these devices introduce,” “Security for these devices is typically a secondary concern to cost and usability and has traditionally been overlooked by both manufacturers and consumers.” reported the Team Cymru.

To protect SOHO devices from the attack disable any type of remote administration access from the Internet and change default usernames and passwords. Be sure to install the latest-available version of the firmware for your SOHO devices.

Please read the report and share it!

Pierluigi Paganini

(Security Affairs –  SOHO wireless routes, hacking)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

A flaw could allow recovery of the phone number associated with any Google account

A vulnerability could allow recovery of the phone number associated with a Google account by…

2 hours ago

Texas Department of Transportation (TxDOT) data breach exposes 300,000 crash reports

Hackers breached Texas DOT (TxDOT), stealing 300,000 crash reports with personal data from its Crash…

13 hours ago

SAP June 2025 Security Patch Day fixed critical NetWeaver bug

SAP fixed a critical NetWeaver flaw that let attackers bypass authorization and escalate privileges. Patch…

16 hours ago

U.S. CISA adds RoundCube Webmail and Erlang Erlang/OTP SSH server flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds RoundCube Webmail and Erlang Erlang/OTP SSH server flaws…

19 hours ago

Mirai botnets exploit Wazuh RCE, Akamai warned

Mirai botnets are exploiting CVE-2025-24016, a critical remote code execution flaw in Wazuh servers, Akamai…

23 hours ago

China-linked threat actor targeted +70 orgs worldwide, SentinelOne warns

China-linked threat actor targeted over 70 global organizations, including governments and media, in cyber-espionage attacks…

1 day ago