D-Link And Linksys Routers Hacked To Point Users To Coronavirus-themed Malware
For almost a week, a group of hackers has been breaking into people's routers and changing DNS settings in order to point unsuspecting device users to coronavirus-related sites pushing malware.
The attacks have currently targeted D-Link and Linksys routers, according to reports from cyber-security firm Bitdefender and tech support forum and news site Bleeping Computer.
According to Bitdefender, hackers are using brute-force attacks to guess the admin password of targeted routers. Once they guess a password and get in, hackers change the router's default DNS server settings, pointing the device to their own servers.
This means that every DNS query made by users connected to a hijacked router goes through the hackers' DNS servers, giving the attackers full control over what sites a user accesses.
Per reports, when users attempt to access a list of particular domains, hackers have been redirecting users to a custom site urging users to install a coronavirus (COVID-19) information app.
Both Bitdefender and Bleeping Computer said this app installs a version of the Oski trojan. Oski is a recent infostealer trojan sold on Russian-speaking dark web forums. The trojan's primary function is to steal account credentials from browsers and cryptowallet files to hijack cryptocurrency accounts.
Per Bitdefender, users have reported being redirected to the malicious coronavirus-themed site when they tried to access one of the following domains:
aws.amazon.com
goo.gl
bit.lywashington.edu
imageshack.usufl.edu
disney.comcox.net
xhamster.compubads.g.doubleclick.net
tidd.lyredditblog.com
fiddler2.comwinimage.com
The malicious DNS servers used by hackers are 109.234.35.230 and 94.103.82.249. If ZDNet readers use a D-Link or Linksys router they should connect to the device's admin panel and check if these two IP addresses appear in the DNS settings section.
If they do, users should remove the DNS server IP addresses and change the router's admin panel password.
This campaign first began on March 18 and is currently ongoing. D-Link and Linksys owners should be on the lookout for any unprompted requests to download and install coronavirus-related apps -- a common malware lure these days, for both common cybercriminals and state-sponsored groups alike.
Reassessing AI Investments: What The Correction In US Megacap Tech Stocks Signals
The recent correction in US megacap tech stocks, including giants like Nvidia, Tesla, Meta, and Alphabet, has sent rippl... Read more
AI Hype Meets Reality: Assessing The Impact Of Stock Declines On Future Tech Investments
Recent declines in the stock prices of major tech companies such as Nvidia, Tesla, Meta, and Alphabet have highlighted a... Read more
Technology Sector Fuels U.S. Economic Growth In Q2
The technology sector played a pivotal role in accelerating America's economic growth in the second quarter of 2024.The ... Read more
Tech Start-Ups Advised To Guard Against Foreign Investment Risks
The US National Counterintelligence and Security Center (NCSC) has advised American tech start-ups to be wary of foreign... Read more
Global IT Outage Threatens To Cost Insurers Billions
Largest disruption since 2017’s NotPetya malware attack highlights vulnerabilities.A recent global IT outage has cause... Read more
Global IT Outage Disrupts Airlines, Financial Services, And Media Groups
On Friday morning, a major IT outage caused widespread disruption across various sectors, including airlines, financial ... Read more