Drive-By Pharming In the Wild 205
An anonymous reader writes "Symantec reported Tuesday that the first case of drive-by pharming, in which a hacker changes the DNS settings on a customer's broadband router or wireless access point and directs the link to a fraudulent Web site, has been observed in the wild. The first drive-by pharming attack has been observed against a Mexican bank: 'It's associated with an e-mail pretending to be from a legitimate Spanish-language e-greeting card company, Gusanito.com,' says Symantec Security Response principal researcher Zulfikar Ramzan. Inside the e-mail is an HTML image tag but instead of displaying images, it sends a request to the home router to tamper with it."
Pfft (Score:5, Insightful)
Re: (Score:3, Insightful)
Having a real workhorse as your router improves security dramatically as well as allowing you to do some really cool things.
Re: (Score:2)
Re: (Score:2)
Its a home server with TV card, terrabyte raid array, etc...
Re: (Score:3, Funny)
Also, the A in RAID stands for Array. RAID Array is like ATM Machine or PIN Number.
Re: (Score:3, Informative)
Just out of interest, what OS is this monster router
Re: (Score:2)
Its locked down pretty well so the only way in is via a vulnerability in SSHD, Apache, etc... which is unlikely.
Especially with Gentoo's quick reaction times when it comes to new versions.
I'd consider it a lot more secure than your off the shelf router. Also the data would be far less secure if it was stored on a windows box.
Its all about degrees of security.
Sure putting large amounts of data on the border of your network isnt the best idea but its acceptable when you dont have enough spare c
Re: (Score:2)
Re: (Score:2)
Once again, cheap consumer junk FTL!
Re: (Score:2)
Re: (Score:2)
For something that only cost me around $150 AU it is rock solid, secure, and with the linux based firmware, allows me to do some cool stuff (like run kismet-server on it and - so I am told - run packet injection off it).
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Most Pooter owners too dumb to own one (Score:4, Informative)
Re: (Score:2)
But anyway, those are really good ideas. However, I don't see it necessary to turn off DHCP, though I would encourage layering your network and only the inner box has DHCP, and then only on the LAN interface.
How I do it is a 3COM OfficeConnect on the outside, which is a 4-port ADSL Router. I don't have a modem because ADSL technically can't have MODEMs (ADSL lacks modulating AND demodulating) - even though I can't get Blizzard support to understand thi
Re: (Score:2)
Er, what are you talking about? I was under the impression that ADSL signals were modulated and demodulated, otherwise (as raw DC voltages carrying serial data?) they would be destroyed by the phone equipment at any transformer.
Depends on your definition of "MODEM" (Score:2)
What was classically called a Modem in home computers was a specific device that did modulates digital data into sound that could be subsequently carried over phone lines, radio links or more exotic means.
In this perspective the GP poster is right : ADSL is NOT such a modem because it modulates using a different frequency band thus enabling the concurrent use of both voice AND internet (or voice/data and internet if the ph
The AC has it right! (Score:2, Insightful)
Security by obscurity. Great policy.
Re:Most Pooter owners too dumb to own one (Score:4, Insightful)
But you forgot something: When a friend brings their PC/PSP/PS3/Wii/Xbox/iPhone/iPod over, and wants to use it with teh Intarwebs, go ahead and set it up and give them the passphrase and IP assignment, but make sure you destroy your friend before they leave.
You can't allow any chance of your uber-obscurity leaking outside, right? Eventually, you'll eliminate all of your friends, but that has the nice benefit of eliminating the potential leaks.
Naw, better to keep it simple. Don't run as root/admin. Set an unusual password (something other than your SO or child's name is adequate). Set a different, unusual, and lengthy, WAP passphrase. Use the strongest encryption you can with the devices on your network (AES, AES / TKIP, or just TKIP, in order of preference).
Done.
MAC filtering? Disabling DHCP? IP address range hide and seek?
Bullshit. All that does is make it harder for you and the people you trust to use the network. And if I, the creepy dude in the van across the street, get to a point where any of those stupid tricks will start to matter, they won't make any difference at all. If I'm clever enough to get past WAP, then I'm clever enough to clone a MAC address while sniffing past the rest of your security-through-obscurity features.
[And what's all that talk about serial ports? Are we still in 2008, or did we just jump back 10 years?]
DHCP is fine, use a less obvious IP range (Score:2)
BTW the 'third and fourth hex digits'
Re: (Score:3)
Sounds like someone doesn't understand how DHCP and subnetting work. You can change the DHCP addressing range on your router so that it gives out, say, 192.168.100.0/24. There is no need to use manual addressing unless you have untrusted people able to physically plug into your LAN. Also, IP v4 addresses can be expressed in
Re: (Score:2)
You'd think that a bank would have a certificate signed by a big certification authority, like Verisign, whose public key comes hard-coded into the browser. In that case, the entire attack should fail.
Re: (Score:2)
My solution BTW was not to assign an IP address for the router (used only as a modem) and to firewall non PPPoE traffic.
Re: (Score:3, Informative)
It is also possible to change settings on a router using UPnP using a malicious flash script...
See http://www.gnucitizen.org/blog/flash-upnp-attack-faq [gnucitizen.org] for details.
Most home routers have UPnP turned on, so you're not safe just because you have a good password.
I would assume that most 3com gear does not have UPnP, so it is quite likely that you specifically are safe.
Of course, anyone with a security clue has been saying UPnP is a BAD idea for a long time, but it used to be client side malwar
Re: (Score:2, Offtopic)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Let me guess... L: "admin" P: "admin" (Score:3, Insightful)
http://www.google.com/search?hl=en&q=default+router+passwords&btnG=Google+Search [google.com]
Re:Let me guess... L: "admin" P: "admin" (Score:4, Informative)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
the most interesting combination i've ever seen as a default was U:r0ot P:U53r.. This was on an Open Networks ADSL router. It still fails the strength test (too short, and derived from a known string), but at least it's better than Admin/Password
Re: (Score:2)
I was surprised, I was expecting it to be completely unsecured, like every other home router.
Captcha? (Score:5, Informative)
Re: (Score:2)
captcha page => spoof captcha page so user solves captcha for program => "hack" succeeds.
Re: (Score:2)
Re: (Score:3, Informative)
Re:Captcha? (Score:5, Insightful)
Which one makes more sense?
Re: (Score:2)
Re: (Score:2)
Too easy for the attacker to add a new root certificate.
Re: (Score:2)
Sorry, but I have to go with the Captcha.
If the user is forced to change the password, customer service is forced to deal with everyone that forgot their password.
Re: (Score:2)
Anyway tech support already has to deal with the people who cannot read what the initial ip is, what the default password is, etc...
The added work load would be minimal.
Re: (Score:2)
Re: (Score:2)
If you happen to leave yourself logged in to your router, captcha wouldn't even cut it -- I'm pretty sure this is a CSRF attack, so any credentials your browser session has are applied. You'd have to put a captcha on every single page -- clearly the wrong solution.
...And of course, remembering to log out once you're don
There are some better solutions, though:
http://en.wikipedia.org/wiki/Cross-site_request_forgery#Prevention [wikipedia.org]
Biggest Mexican Bank? (Score:5, Informative)
There is not much space to guess here, it is either Banamex or Bancomer...
Re:Biggest Mexican Bank? (Score:4, Informative)
Trend Micro has a more recent report on a variation of this attack http://blog.trendmicro.com/targeted-attack-in-mexico-dns-poisoning-via-modems/ [trendmicro.com]
The UNAM-CERT, also has the "Gusanito" exploit documented (spanish only) at http://www.seguridad.unam.mx/doc/?ap=articulo&id=196 [seguridad.unam.mx]
The attack overrides the modem's password...
Re: (Score:2, Interesting)
Definition? (Score:5, Interesting)
Re: (Score:2)
Re: (Score:3, Funny)
British Telecom Home Hub (Score:5, Interesting)
Anyone else notice that BT are taking this seriously - log on to the router's home page and it tells you they have changed the default admin password (well it will when you enter the unit's serial number as the admin password.
And Sky...sort of (Score:2)
They give you a Netgear router, and it doesn't use admin:password. Hurrah for security improvements! Instead it uses admin:sky...
Yes, it really was that basic a change! As far as I've found they don't even let normal users know how to log in and change it, I just guessed it. They also leave their SSID as one that screams "I'm a sky box" so anyone scanning for networks can even see that your password will probably be "sky".
Enough with the default passwords. (Score:5, Insightful)
Seriously, you could even honestly market them as "more secure."
Re:Enough with the default passwords. (Score:5, Informative)
Re: (Score:2)
It would be trivial to use the LAN MAC address as the default password.
Re:Enough with the default passwords. (Score:4, Insightful)
Re: (Score:2)
BT's newest "home hub" routers come with their wireless password set unique to the router (not sure what it's generated from) and admin password set to the router's serial number.
I wish more home routers defaulted to this.
Re: (Score:2, Interesting)
LAN MAC address is burned into an EEProm at time of manufacture. It is also reset to "Factory Default" when you reset the box. It should be trivial to burn a randomized default password at the same time, store it in a database and print it on the manual.
If the customer calls up with an unresponsive router, customer service can read them the password out of the db.
Re:Enough with the default passwords. (Score:5, Informative)
Nope. I do embedded software, and write the test suite all those devices go through before being shipped to the customer. It's pretty standard to set custom stuff at that time, including the MAC ID for the unit. It would be just as easy to change the password at that time.
Your comment about the CD key, however, is right on.
Re: (Score:2)
And as for the silicon, if you can make encrypted cordless phones with unique, hardwired keys for $50, you can make a router with an unique hardwired "default" key, too. And you can stamp that in a metal plate on the bottom, so the users can always fi
Re: (Score:2)
Re: (Score:2)
Gamers are used to it... (Score:2)
$1 too much (Score:2)
My guess: it would cost $50K in R&D, $200K in equipment costs, $0.40 in parts and $0.60 in labor/time for each unit to make this happen.
A beancounter somewhere would see that $1 as "cost we could get out of the unit".
Seriously, you could even honestly market them as "more secure."
Yes, but beancounters are called that because they can't see the big picture. Many times CEO's fit this bill.
Re:Enough with the default passwords. (Score:4, Interesting)
Hardware says "blink"..."blink"..."blink"... and user calls customer support, adding $10 to the cost of every sale.
Last two routers I bought fixed this (Score:3, Insightful)
The instructions on the screen were, predictably, written so that you could understand them if you were six. One of them was "Pick a username and password". Presto-changeo, no need for a factory default.
I don't remember the makes and models of the routers, though. They're a commodity -- I went into Best Buy and, for the first time in
Re: (Score:2)
Re: (Score:3, Insightful)
that way the same binary image can be used on every router. Out of the box they do not work, they requre the user to have at last 35 brain cells to get it to work and in the process will be safe from this crap.
Re: (Score:2)
Re: (Score:2, Insightful)
that wouldn't really help, drive-by attacks access the router from the lan side anyway, so would already have access to the lan side mac address.
Cold War Redux (Score:3, Funny)
By the way I'm rooting for the Nigerians in this grand campaign, at least their scams provide a laugh once and awhile.
Gusanito?? (Score:3, Funny)
Fankly, I'm suprised (Score:4, Funny)
Re:Fankly, I'm suprised (Score:4, Insightful)
"Samaritan" huh? (Score:2)
Re:Fankly, I'm suprised (Score:5, Funny)
--
"It's a simple question, doctor.
Would you eat the moon if it was made of ribs, or not?"
CORRECTION: Would you eat the moon if it were made of ribs, or not?
In this case, the verb "to be" is in the subjunctive mood, which is used to indicate a situation that is hypothetical, conditional or somehow not certain.
Now, this correction is just a courtesy. However, if you tell me to take a hike, I will show up at your door with A Writer's Reference by Diana Hacker, and you can scratch me out a check. Sorry, I don't know how much you paid for your pants.
Re: (Score:2)
You're right, it's quite acceptable among those who live in the trailer parks around here. I often hear these people say things like "if I wuz you..." However, educated people use the subjunctive mood because it more accurately conveys information and it's better form. Plus they like not sounding like a dumbass.
Re: (Score:2)
Re:Fankly, I'm suprised (Score:4, Funny)
You don't correct the grammar of a quote, douchebag.
You do if the quote [imdb.com] is quoted incorrectly with poor grammar, douchebag.
Idiots with default passwords get pwnd, news at 11 (Score:5, Insightful)
I gotta wonder.. (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Setting the admin password has nothing at all to do with WEP, WPA, or anything else used to keep people off your private WiFi.
DNS cache poisoning (Score:4, Informative)
Langfeldt's DNS how-to [tldp.org]
Pharming??? (Score:5, Funny)
Mod +1 -- (Score:2)
Worse possibilities (Score:2, Interesting)
It's a little extra work, but the companies that make these things should have unique passwords per device, or at least have logging into the admin interface wirelessly off by default. In an attempt to
Appropriate name indeed (Score:2)
Let me explain (Score:5, Informative)
The most prominent ISP in Mexico (Telmex) uses 2wire gateway modems, most of them wireless enabled. Security is turned on by default using serial numbers so no one from outside can login "easily".
However, there is no default security from the inside, so the gusanito.com postcard contains a malicious flash program that sends a special URL to the modem that adds a DNS entry to its local name resolution table pointing www.banamex.com to a pharming site.
Next time you open IE or any other browser and open www.banamex.com you'll get redirected to the other site.
This easily solved putting a user password on the modem configuration, but not all people care to do that.
Re: (Score:3, Informative)
Trend Micro has a more recent report on a variation of this attack http://blog.trendmicro.com/target [trendmicro.com]
Look for the "https:" (Score:5, Informative)
When I explain to people how to use the Web, I always tell them to look for the security indicators [oreilly.com] before doing anything involving money.
P.S. I wouldn't be surprised if the bad guys here added Javascript code to their fake bank site, to rewrite the address bar of the web browser to show the "https:". This is why I prefer to do all my online banking with Javascript disabled; thank you, NoScript [noscript.net].
steveha
Re: (Score:2)
1) The lock symbol. It should be on the address bar, preferably displayed whole without a line running through it. The presence of https: alone doesn't highlight the connection's overall level of trust/security.
2) The DOMAIN NAME. Most people, even most techies, forget this crucial part. The certificate/lock validates the domain name, and YOU must determine if that domain name is the one you really want to talk to. Ex: the site 'ebai.com' may have a perfectly valid certificate, even
Re: (Score:2)
Not that I read TFA, but I would imagine the Javascript is embedded in the email, which loads a pop-up to "192.168.1.1" and attempts to login with "admin" as a username and "admin" as a password. Reading from the pop-up page, the Javascript wouldn't have too difficult of a time figuring out the router version and changing the DNS server. It might be doable with Ajax, which would allow this all to happen behind the scenes. Obviously, this isn't going to work for any competent