Jump to content


Photo

Mexico: DNS poisoning via DSL modems


  • Please log in to reply
1 reply to this topic

#1 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,562 posts

Posted 11 January 2008 - 11:41 AM

FYI...

- http://blog.trendmic...ing-via-modems/
January 11, 2008 - "...TrendLabs researchers have received reports of what appears to be an attempt of a massive DNS poisoning attack in Mexico... the attack begins with the exploitation of a known vulnerability in 2Wire modems*. The said vulnerability allows an attacker to modify the local DNS servers and hosts. One of the main Internet Service Providers in Mexico offers 2Wire modems to their customers, and it is estimated that more than 2 million users are at risk... exploit arrives with a newsy email message... once an unsupecting user opens the email in its full HTML format, the exploit code automatically attempts to access the modem’s Web console and modify the local host database to redirect all requests for banamex.com — the Web site of one of the largest banks in Mexico — to a fraudulent site... The malicious email message also promises a “video” and includes a link that points to the a malicious URL where the .RAR acrhive Video_Narco.rar can be downloaded. This archive contains the malicious file Video_Narco.exe..."
* http://nvd.nist.gov/...e=CVE-2007-4389

:ph34r:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#2 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 10,562 posts

Posted 05 March 2008 - 08:33 PM

FYI...

Targeted Attack in Mexico, Part 2: Yet Another Drive-By Pharming
- http://blog.trendmic...ve-by-pharming/
March 5th, 2008 - "Two months ago, TrendLabs reported of a massive DNS poisoning attack in Mexico. The said incident is believed to be one of the first (if not the first) “drive-by pharming” attacks seen in the wild. Now, we have received reports of a similar incident — and by “similar” we mean that quite literally... just like the previous attempt, this new attack also takes advantage of a vulnerability in 2wire modems and arrives via spammed email messages. This time, though, the email messages are disguised to trick users into thinking that they have received an electronic postcard from Gusanito.com, a popular eCard Web site... Once a user clicks on the link where the supposed postcard can be viewed, he or she is then directed to a spoofed Gusanito page... Unbeknowst to the user, the said page loads a couple of .SWF files (or Flash controls), including a malicious one that modifies the 2wire modem localhost table. The said routine effectively redirects users to a fraudulent site whenever they attempt to access pages related to Banamex.com — the same banking site targeted two months ago... It seems that drive-by pharming has indeed “arrived” in the threat scene. One may wonder now who will be targeted next, and given the stealth and sophisitication of this threat. User awareness, product/application updates, and in-the-cloud protection is needed more than ever... Trend Micro will detect the malicious .SWF file as SWF_ADHIJACK.D..."

:ph34r: :grrr:

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

Member of ASAP and UNITE
Support SpywareInfo Forum - click the button