Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 19 submissions in the queue.
posted by janrinok on Monday August 13 2018, @04:49AM   Printer-friendly

Submitted via IRC for SoyCow1984

DLink vulnerability lets attackers remotely change DNS server settings.

Hackers have been exploiting a vulnerability in DLink modem routers to send people to a fake banking website that attempts to steal their login credentials, a security researcher said Friday.

The vulnerability works against DLink DSL-2740R, DSL-2640B, DSL-2780B, DSL-2730B, and DSL-526B models that haven’t been patched in the past two years. As described in disclosures here, here, here, here, and here, the flaw allows attackers to remotely change the DNS server that connected computers use to translate domain names into IP addresses.

According to an advisory published Friday morning by security firm Radware, hackers have been exploiting the vulnerability to send people trying to visit two Brazilian bank sites—Banco de Brasil’s www.bb.com.br and Unibanco’s www.itau.com.br—to malicious servers rather than the ones operated by the financial institutions. In the advisory, Radware researcher Pascal Geenens wrote:

The attack is insidious in the sense that a user is completely unaware of the change. The hijacking works without crafting or changing URLs in the user’s browser. A user can use any browser and his/her regular shortcuts, he or she can type in the URL manually or even use it from mobile devices such as iPhone, iPad, Android phones or tablets. He or she will still be sent to the malicious website instead of to their requested website, so the hijacking effectively works at the gateway level.

Source: https://arstechnica.com/information-technology/2018/08/in-the-wild-router-exploit-sends-unwitting-users-to-fake-banking-site/


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Monday August 13 2018, @07:41AM (5 children)

    by Anonymous Coward on Monday August 13 2018, @07:41AM (#720861)

    and DNSSEC is not deployed by these banking sites why? And DNSSEC is not used by clients, why?

    All these things are only possible because of lazy admins not deploying DNSSEC. True, it still a little difficult to get official certificate for a bank from a CA, but without DNSSEC, you can redirect HTTP traffic at least and then you can use international character sets to make similar looking domain name that will get authenticated and get a CA. So again, why is DNSSEC not deployed by banks??

  • (Score: 3, Funny) by FatPhil on Monday August 13 2018, @11:02AM (3 children)

    by FatPhil (863) <pc-soylentNO@SPAMasdf.fi> on Monday August 13 2018, @11:02AM (#720899) Homepage
    But wouldn't this also be defanged just from using HTTPS? And why on earth are banks not using HTTPS?

    Having said that I can imagine a phishing page being sneaky and saying something like "please log in to enter our secure site" to fool people into accepting being on an insecure page.
    --
    Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves
    • (Score: 4, Informative) by Pino P on Monday August 13 2018, @12:44PM (2 children)

      by Pino P (4721) on Monday August 13 2018, @12:44PM (#720936) Journal

      The featured article states that the spoofed site uses a certificate from an unknown issuer, yet users just clicked past it.

      • (Score: 2) by FatPhil on Monday August 13 2018, @02:06PM

        by FatPhil (863) <pc-soylentNO@SPAMasdf.fi> on Monday August 13 2018, @02:06PM (#720976) Homepage
        Ah, I read the "here", "here", "here", "here", "here", and "advisory" links, but not that final one - thanks!
        --
        Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves
      • (Score: 2) by FatPhil on Monday August 13 2018, @02:09PM

        by FatPhil (863) <pc-soylentNO@SPAMasdf.fi> on Monday August 13 2018, @02:09PM (#720980) Homepage
        However, "Geenens told Ars that Banco de Brasil’s website can be accessed over unencrypted and unauthenticated HTTP connections [...]"
        --
        Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves
  • (Score: 2) by Pino P on Monday August 13 2018, @12:41PM

    by Pino P (4721) on Monday August 13 2018, @12:41PM (#720934) Journal

    DNSSEC got off to a bad start when browsers didn't want to rely on a root key that was only 1024 bits. Even nowadays, some major registrars such as GoDaddy consider DNSSEC a premium feature and charge extra for adding DNSSEC to the zone hosting bundled with a domain. Between these, we ended up with Let's Encrypt instead of DANE TLSA.