Categories: Cyber Crime

Exploiting DNS Poisoning in Brazilian Boleto Fraud Scheme

In recent months Brazilian criminal crews have started using DNS poisoning technique to target Brazilian Boletos.

Security experts at RSA reported that DNS poisoning attacks are being used by cybercriminals to target Brazilian Boletos.

What is Boleto?

People in Brazil use popular payment method known as “Boleto” to purchase services and products by using vouchers instead of credit cards. This payment method allows people to pay online, at ATMs, banks, post offices, and even in some general stores.
Boleto fraud is a common phenomenon in Brazil. RSA reported that Cybercriminals compromises approximately 500,000 Boleto transactions over a two year period by using malware known as Bolware in July 2014. The estimated value of the transactions was close to $3.75 billion. Curiously, the Brazilian banking association FEBRABAN in 2012 has provided an optimistic estimation related to financial fraud losses reporting only $700 million.

The Boleto malware implemented the man-in-the-browser technique to exploit vulnerabilities in popular browsers, including Chrome, Firefox and Internet Explorer running on Windows machines.

The malware used in the fraudulent transactions is able to hijack Boleto payments to a series of accounts managed by the crooks and used as money mule accounts.
Cybercriminals started performing DNS cache poisoning in their operations in addition to malware. RSA mentioned, now a day, DNS servers of Internet service providers are being targeted by attackers to modify the DNS entries for certain bank websites so that their systems IP address remain anonymous.

“A new approach to the Boleto fraud has emerged in recent months, the fraudsters were able to use a known technique to poison a DNS entry used by a bank website and redirect the IP address resolution to the fraudster’s HTTP server. This method enables the fraudster to host a fake/substitute JavaScript instead of the original file hosted on the legitimate bank website. The substitute JavaScript controlled by the fraudster can alter the behavior of the target webpage, without the bank customers being aware of the manipulation. The substituted JavaScript file can install any handle on any page in the legitimate website that uses it, and can even perform advanced attacks using existing frameworks.” states a blog post issued by the RSA.

The attackers inject malicious javascript into the webpage which get executed when a user visits the bank website. The cybercriminals are so advanced that they can even deface webpage and alter the action of a legitimate user in the account.
Cybercriminals start monitoring bank website when a Boleto expires because it can be paid at the issuer bank only after expire. When the expired Boleto’s number is entered on the bank’s website, the injected javascript allows attackers to modify the server’s response and presents the victim with a fake Boleto.

Meanwhile, the payment details on the new Boleto gets directed to the attacker’s account without intimating victim.
This attack mainly contains DNS cache poisoning process, in which an attacker makes a DNS request for the targeted domain. The DNS server queries the root name server for the entry. Meanwhile, the attacker sends fake response and flood DNS server for the targeted domain, so the legitimate response can be ignored from the root server. Users who access the targeted bank’s website and directed to the fake server can be found from poisoned entry as it remains in the cache for hours and even for some days.

According to RSA, the three known attack vectors affecting the DNS server are:

  1. Bad management of the root password – if the root password of the server isn’t strong enough, it’s only a matter of time before someone can crack it using techniques such as a ‘dictionary attack’[1].
  2. Vulnerable server – the server is running outdated and vulnerable software that can be compromised by using a piece of code that is publicly available on the internet.
  3. DNS Cache Poisoning – this is a known technique that involves the attacker changing a DNS entry temporarily (which may last days before expiring) via a specific URL.

RSA also provided a few countermeasures which can prevent users to be victims of Boleto Scams. To mitigate this type of attack is suggested to use DNSSEC, which secure DNS extensions, maximize the randomness of port numbers in the server, open recursive name servers should be disabled, data transmission should use HTTPS and upgrade modems timely.

ABOUT THE AUTHOR:
SUMIT KUMAR (MS Infosec(IIIT-A), C|EH v8, ISO 27001 LA)
MS in cyber law & Information securitysecurity

Institute – Indian Institute of Information Technology- Allahabad

Email id- sumit843302@gmail.com

EDITED by Pierluigi Paganini

(Security Affairs –  RSA, Boleto)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Experts warn of an ongoing malware campaign targeting WP-Automatic plugin

A critical vulnerability in the WordPress Automatic plugin is being exploited to inject backdoors and…

15 hours ago

Cryptocurrencies and cybercrime: A critical intermingling

As cryptocurrencies have grown in popularity, there has also been growing concern about cybercrime involvement…

17 hours ago

Kaiser Permanente data breach may have impacted 13.4 million patients

Healthcare service provider Kaiser Permanente disclosed a security breach that may impact 13.4 million individuals…

17 hours ago

Over 1,400 CrushFTP internet-facing servers vulnerable to CVE-2024-4040 bug

Over 1,400 CrushFTP internet-facing servers are vulnerable to attacks exploiting recently disclosed CVE-2024-4040 vulnerability. Over…

20 hours ago

Sweden’s liquor supply severely impacted by ransomware attack on logistics company

A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …

22 hours ago

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

1 day ago

This website uses cookies.