Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Massive campaign uses router exploit kit to change routers' DNS servers

Massive campaign uses router exploit kit to change routers' DNS servers

2015/05/26

Securityweek - (International) A security researcher discovered an active campaign in which attackers are targeting Google Chrome browser users with cross-site request forgery (CSRF) code attacks via compromised Web sites with the intent of compromising routers and changing their domain name system (DNS) settings to point to a hacker-controlled server. Researchers believe that millions of devices across 55 router models made by several manufacturers have been affected in the campaign.

Source: http://www.net-security.org/secworld.php?id=18424

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:24:23