The attack changes the DNS settings of a router using default login credentials, Proofpoint says An email-based attack spotted in Brazil recently employed an unusual but potent technique to spy on a victim’s Web traffic. The technique exploited security flaws in home routers to gain access to the administrator console. Once there, the hackers changed the routers’ DNS (Domain Name System) settings, a type of attack known as pharming. Pharming is tricky to pull off because it requires access to an ISP’s or an organization’s DNS servers, which translate domain names into the IP addresses of websites. Those DNS systems are typically well-protected, but home routers often are not. Security firm Proofpoint wrote in a blog post Thursday that launching the attack via email was a novel approach since pharming is normally a network-based attack. “This case is striking for several reasons, not the least of which is the introduction of phishing as the attack vector to carry out a compromise traditionally considered purely network-based,” the company wrote, adding that it showed “the continued pre-eminence of email as the go-to attack vector for cybercriminals.” A successful pharming attack means users can be diverted to a fraudulent website even when they enter a correct domain name. It also means an attacker can perform a man-in-the-middle attack, such as intercepting email, logins and passwords for websites, and hijacking search results, among other things. Proofpoint said it detected about 100 phishing emails sent mostly to Brazilians who used either UTStarcom or TR-Link home routers. The emails purported to be from Brazil’s largest telecommunications company. They contained malicious links, and clicking one directed the victim to a server that attacked their router. The server was set up to exploit cross-site request forgery (CSRF) vulnerabilities in routers, If the attack was successful, the hackers gained access to the administrator control panel of the router. They then entered default login credentials for the device, hoping that the user hadn’t changed them If that worked, they changed the router’s setting to their own DNS server. Any computer connected to that router “would potentially have their computer query a malicious DNS server to look up any hostname on the Internet.” Although users are dependent on their router manufacturer to issue patches for CSRF flaws, there is another defense, which is old security advice: change the default password on your router. Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk Related content feature Windows 10: A guide to the updates Here's what you need to know about each update to the current version of Windows 10 as it's released from Microsoft. Now updated for KB5036979 Preview, released on April 23, 2024. By Preston Gralla Apr 25, 2024 172 mins Small and Medium Business Windows 10 Microsoft opinion The end of non-compete agreements is a tech job earthquake The FTC ruled this week that companies can no longer use non-compete agreements to stop workers from moving from one job to another — and businesses are having fits. By Steven Vaughan-Nichols Apr 25, 2024 5 mins Regulation Government IT Jobs news Meta opens its mixed-reality Horizon OS to other headset makers Lenovo and Asus are among the companies building headsets that run Horizon software. The move expands Meta’s reach in the AR/VR market, while enabling headset vendors to focus on hardware development rather than software. By Matthew Finnegan Apr 24, 2024 6 mins Augmented Reality Google Virtual Reality tip A crafty new Android notification power-up This simple enhancement will make your Android notifications more useful and less annoying — with about 60 seconds of one-time setup. By JR Raphael Apr 24, 2024 7 mins Google Mobile Apps Android Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe