• Announcements

    • Budfred

      IE 11 copy/paste problem

      It has come to our attention that people using Internet Explorer 11 (IE 11) are having trouble with copy/paste to the forum. If you encounter this problem, using a different browser like Firefox or Chrome seems to get around the problem. We do not know what the problem is, but it seems to be specific to IE 11 and we are hopeful that Microsoft will eventually fix it.
    • Budfred

      PLEASE READ - Reversing upgrade   02/23/2017

      We have found that this new upgrade is somewhat of a disaster.  We are finding lots of glitches in being able to post and administer the forum.  Additionally, there are new costs associated with the upgrade that we simply cannot afford.  As a result, we have decided to reverse course and go back to the previous version of our software.  Since this will involve restoring it from a backup, we will lose posts that have been added since January 30 or possibly even some before that.    If you started a topic during that time, we urge you to make backups of your posts and you will need to start the topics over again after the change.  You can simply paste the copies of your posts that you created at that point.    If you joined the forum this month, you will need to re-register since your membership will be lost along with the posts.  Since you have a concealed password, we cannot simply restore your membership for you.   We are going to backup as much as we can so that it will reduce inconvenience for our members.  Unfortunately we cannot back everything up since much will be incompatible with the old version of our software.  We apologize for the confusion and regret the need to do this even though it is not viable to continue with this version of the software.   We plan to begin the process tomorrow evening and, if it goes smoothly, we shouldn't be offline for very long.  However, since we have not done this before, we are not sure how smoothly it will go.  We ask your patience as we proceed.
Sign in to follow this  
Followers 0
AplusWebMaster

Mexico: DNS poisoning via DSL modems

2 posts in this topic

FYI...

 

- http://blog.trendmicro.com/targeted-attack...ing-via-modems/

January 11, 2008 - "...TrendLabs researchers have received reports of what appears to be an attempt of a massive DNS poisoning attack in Mexico... the attack begins with the exploitation of a known vulnerability in 2Wire modems*. The said vulnerability allows an attacker to modify the local DNS servers and hosts. One of the main Internet Service Providers in Mexico offers 2Wire modems to their customers, and it is estimated that more than 2 million users are at risk... exploit arrives with a newsy email message... once an unsupecting user opens the email in its full HTML format, the exploit code automatically attempts to access the modem’s Web console and modify the local host database to redirect all requests for banamex.com — the Web site of one of the largest banks in Mexico — to a fraudulent site... The malicious email message also promises a “video” and includes a link that points to the a malicious URL where the .RAR acrhive Video_Narco.rar can be downloaded. This archive contains the malicious file Video_Narco.exe..."

* http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4389

 

:ph34r:

Share this post


Link to post
Share on other sites

FYI...

 

Targeted Attack in Mexico, Part 2: Yet Another Drive-By Pharming

- http://blog.trendmicro.com/targeted-attack...ve-by-pharming/

March 5th, 2008 - "Two months ago, TrendLabs reported of a massive DNS poisoning attack in Mexico. The said incident is believed to be one of the first (if not the first) “drive-by pharming” attacks seen in the wild. Now, we have received reports of a similar incident — and by “similar” we mean that quite literally... just like the previous attempt, this new attack also takes advantage of a vulnerability in 2wire modems and arrives via spammed email messages. This time, though, the email messages are disguised to trick users into thinking that they have received an electronic postcard from Gusanito.com, a popular eCard Web site... Once a user clicks on the link where the supposed postcard can be viewed, he or she is then directed to a spoofed Gusanito page... Unbeknowst to the user, the said page loads a couple of .SWF files (or Flash controls), including a malicious one that modifies the 2wire modem localhost table. The said routine effectively redirects users to a fraudulent site whenever they attempt to access pages related to Banamex.com — the same banking site targeted two months ago... It seems that drive-by pharming has indeed “arrived” in the threat scene. One may wonder now who will be targeted next, and given the stealth and sophisitication of this threat. User awareness, product/application updates, and in-the-cloud protection is needed more than ever... Trend Micro will detect the malicious .SWF file as SWF_ADHIJACK.D..."

 

:ph34r::grrr:

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 0