New malware component changes router's DNS settings remotely

  • 3 April 2014
  • 0 replies
  • 637 views

Userlevel 7
Badge +52
Routers from Cisco, D-Link, Huawei, TP-Link and ZTE have been identified as vulnerable.
 
The new version, says analyst Benjamin Vanheuverzwijn, continues the modular approach to darkware coding - and since the code is digitally signed, it is both resilient to protocol manipulation, and likely to be treated as legitimate in a corporate environment. 
 
So what's changed with the new version of the malware? 
 
Because the trojan is modular, like the infamous Zeus financial malware, cyber-criminals can add to, and even change the direction of, the darkware. 
Just recently, says Vanheuverzwijn, a new component has been seen in the trojan, one that has the ability to change a home/small business broadband gateway router's primary DNS address. So far, he adds that routers from Cisco, D-Link, Huawei, TP-Link and ZTE have been identified as vulnerable to the malware attack vector. 
 
Full Article

0 replies

Be the first to reply!

Reply