Thursday, April 9, 16:27
Home security Hackers infringe on DNS routers and spread malicious COVID-19 App

Hackers infringe on DNS routers and spread malicious COVID-19 App

DNS routers

There has been a news in recent days attack that abuses the routers' DNS settings. Then, the web browsers show alerts for one fake application information for COVID-19. The application is supposed to come from World Health Organization. In fact, it doesn't exist application, but the malicious one software Oski stealing information.

In the last five days, people report that the web browser opens by itself and displays a message asking them to download one «COVID-19 Inform App» of the World Health Organization.

Further investigation showed that these alerts were triggered by one attack that changed their DNS servers in housework D-Link or Linksys routers.

As most computers use the IP address and DNS information it provides router their, malicious DNS servers redirect them victims malicious content, which is under the control of the attacker.

How is DNS settings misused?

It is not known at this time how the attackers acquire access to routers to change the DNS configuration, but some users state that it may have been because of her enabled remote access or weak passwords.

Once the hackers gain access, they change the settings, affecting the computers connected to the router.

- Advertisement -

When a computer is connected to a network, the Microsoft uses a function called Network Connectivity Status Indicator (NCSI) », which periodically runs some detectors that check if one computer is actively connected to the Internet.

In Windows 10, one of these active crawlers logs on to the http://www.msftconnecttest.com/connecttest.txt site and checks if the returned content contains the string "Test" Microsoft Connect ”.

If this is the case, then the computer is connected to the Internet. If not, Windows warns that the Internet is inaccessible.

When Windows runs this NCSI detector, the victims this attack is not affiliated with the legal Microsoft 13.107.4.52 IP address. Malicious DNS servers send them to a website located at 176.113.81.159.

COVID-19

This IP address is under the control of the attacker, and instead of sending back a simple text file, it displays a page asking the victim to download and install a fake application WHERE with information about him coronavirus ('Emergency - COVID-19 Informator' or 'COVID-19 Inform App').

If a user downloads and installs the COVID-19 application, will install on his computer Oski Trojan.

The malware will then attempt to steal the following information:

  • of the browser
  • browser history
  • cryptocurrency wallets
  • stored credentials
  • text files
  • 2FA database authenticator
  • screenshot of your desktop at the time of infection
  • other clues

This information is then uploaded to a remote server controlled by hackers. Attackers can use the data to make it happen other attacks on on-line accounts (bank account theft, identity theft or more Phishing attacks).

What should you do if you fall victim to this attack?

If your browser accidentally opens a page promoting a coronary information application (COVID-19), then you should connect to your router and make sure it receives DNS servers from your ISP.

Each router has a different way of configuring DNS servers.

In general, however, you can follow these steps:

  • Connect to your router
  • Find the DNS settings and make sure there are no servers, especially 109.234.35.230 and 94.103.82.249, configured manually. If available, set the DNS servers to "Automatic" or from the ISP.
  • Then save the settings.
  • Restart on all mobile devices, game consoles, and computers so you can be sure they are using the correct DNS settings from your ISP.

As they are users report that their settings have changed due to weak password and remote management enabled, it is important to change your password and disable remote management on routers.

Finally, if you downloaded and installed the fake one application, you should immediately scan your computer for malware.

Then, you'll need to change all the passwords you use on sites and accounts. Choose large and strong passwords.

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement

LEAVE ANSWER

Please enter your comment!
Please enter your name here

LIVE NEWS

Tesla's new Cheetah mode offers top performance

The new Cheetah mode in the Tesla S model pushes the electric car from 0 to 100 km / h faster than ...

Tails 4.5: The new, safer version has been released!

Tails 4.5: The new, safer version has been released - Tails, is a live operating system based on ...

Windows 10 feature helps to delete useless files and apps

Windows 10 will make it easier to delete useless files and apps by displaying them in a list.

Cloudflare: Stops using Google's reCAPTCHA!

Cloudflare has announced that it will stop using Google's reCAPTCHA and switch to a new bot detector that ...

Google Stadia Pro is available for free for two months! Time for video games!

The situation we are experiencing lately due to corona, is one of the most difficult situations of ...

Russia is expected to try to manipulate the 2020 elections

The report comes after election security experts remain on alert for attempts to manipulate the 2020 election by ...

COVID-19: Can it be "reactivated" in treated patients?

According to the Korean Centers for Disease Control and Prevention (KCDC), Coronavirus COVID-19 can be "reactivated" in treated patients. Indicatively, approximately ...

Instructions for the face shields created by Apple

The pandemic of coronavirus has affected all areas of our daily lives and especially our work ....

Windows 10: WSL Linux integration test in File Explorer

Windows 10 improves integration between Windows Subsystem for Linux (WSL) and File Explorer, ...

XHelper malware: reinstalled after resetting to factory settings

The malware XHelper, which affects devices running the Android operating system, was first discovered ...