Malvertising Campaign Infects Your Router Instead of Your Browser (bleepingcomputer.com) 137
An anonymous reader quotes a report from BleepingComputer: Malicious ads are serving exploit code to infect routers, instead of browsers, in order to insert ads in every site users are visiting. Unlike previous malvertising campaigns that targeted users of old Flash or Internet Explorer versions, this campaign focused on Chrome users, on both desktop and mobile devices. The malicious ads included in this malvertising campaign contain exploit code for 166 router models, which allow attackers to take over the device and insert ads on websites that didn't feature ads, or replace original ads with the attackers' own. Researchers haven't yet managed to determine an exact list of affected router models, but some of the brands targeted by the attackers include Linksys, Netgear, D-Link, Comtrend, Pirelli, and Zyxel. Because the attack is carried out via the user's browser, using strong router passwords or disabling the administration interface is not enough. The only way users can stay safe is if they update their router's firmware to the most recent versions, which most likely includes protection against the vulnerabilities used by this campaign. The "campaign" is called DNSChanger EK and works when attackers buy ads on legitimate websites and insert malicious JavaScript in these ads, "which use a WebRTC request to a Mozilla STUN server to determine the user's local IP address," according to BleepingComputer. "Based on this local IP address, the malicious code can determine if the user is on a local network managed by a small home router, and continue the attack. If this check fails, the attackers just show a random legitimate ad and move on. For the victims the crooks deem valuable, the attack chain continues. These users receive a tainted ad which redirects them to the DNSChanger EK home, where the actual exploitation begins. The next step is for the attackers to send an image file to the user's browser, which contains an AES (encryption algorithm) key embedded inside the photo using the technique of steganography. The malicious ad uses this AES key to decrypt further traffic it receives from the DNSChanger exploit kit. Crooks encrypt their operations to avoid the prying eyes of security researchers."
Linux router (Score:3)
Just configure a Linux router and be done with this non-sense (flashing your router, etc.). That's what I have been doing since 1995.
Re: Linux router (Score:5, Interesting)
Better yet, I'd just say that it's your duty to use an ad blocker, mich like it was to use antivirus software in the past.
Re: (Score:3)
Better yet, I'd just say that it's your duty to use an ad blocker, mich like it was to use antivirus software in the past.
The trouble is that more and more sites are now not allowing you to access them without turning off your ad-blocker.
So far I've been avoiding those sites, but if the trend continues I might have to do so for at least some sites...
Re: (Score:2)
The trouble is that more and more sites are now not allowing you to access them without turning off your ad-blocker.
Indeed, there is the German tabloid "Bild Zeitung" which does this (no big loss...). Which other site does this?
And, if you are so inclined, Bild's block is easy to subvert: just do View->PageStyle->NoStyle. Yeah, "No Style", quite fitting for that rag.
Re: (Score:2)
Indeed, there is the German tabloid "Bild Zeitung" which does this (no big loss...). Which other site does this?
Forbes and Wired are the ones I notice the most.
Re: (Score:2)
For Forbes however, you're right. Interesting to see that they've sunk down to the level of Bildzeitung...
Re: (Score:1)
That's a game of whack-a-mole. It only takes a few minutes to break their anti-adblocker bullshit. At the end of the day, it's my browser; I control what it does or does not do. Pornhub started randomizing ids, which you'd think would kill adbolckers, but they've done it so wrong, it's only two mouse clicks to defeat. cpu-world, despite their (impressive) highly complicated, multi-thousand line crap, is defeated by a single rule.
Re: Linux router (Score:4, Insightful)
Yes, ads are malware. They waste your time, attention, bandwidth and battery time, and run hostile third-party code on your machine.
Let's take a look at Wikipedia [wikipedia.org] take at it:
Malware, short for malicious software, is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising.
Check, check, check and check.
Re: (Score:3)
Some banks require you to use anti-virus software. If you don't and your money is stolen, they will try to blame you and not pay out.
I'm just waiting for the first bank to start asking customers if they run an ad-blocker and then claiming the lack of one is poor security and shifts the liability on to the account holder.
Re: (Score:1)
banks trying to make their policies seem like law to customers is nothing new
Re: (Score:1)
Here we go, again.
A hosts file, alone, is insufficient to protect you, as you admit [slashdot.org]
P.S.=> I don't allow script in my browser
Few users, these days, are using machines to browse that are constrained by resources. Saving 100MB of RAM may have been noticeable in the 90s, but where RAM is measured in GBs, 100MB is a single digit percentage gain. It's simply not noticeable in most cases. Even more so with IO or CPU. Using a hosts file will use less resources than an ad-blocker, but that is irrelevant in most cases.
Blocking ads via a browser add-on that
Re: (Score:1)
I use a Pentium space heater from 1995 as my router, because I love the soothing roar of fan noise, and Linux saves me so much money on the heating bill.
Re: (Score:2)
I was using a Belkin router w/ my PC-BSD laptop, and I'd occasionally get under Chromium an ad where a voice announcement would start and there was no way I could even close the browser - it just seemed to lock it. My only escape was to log out and back in. I ultimately changed the router for a Netgear and escaped the problem.
I wish I could know how to trouble shoot it so that the router could be fixed.
How would that make you safe? (Score:5, Insightful)
You know a large number of commercial routers run on Linux, right? The Linux kernel isn't some magic sauce that makes you immune to hacking. On the contrary, we see flaws in programs that run on Linux all the time, these being one of them. An exploit like this can work on anything, it isn't limited just to prepackaged routers.
So what you mean is get an x64 system and run a Linux distro, with some built in tools for configuring routing. Ok... So long as it doesn't have any bugs they can exploit or check for, you are fine. If it does, well then you are back to having to update... if an update is available. A lot of the router-type Linux distros aren't very well maintained. Smoothwall, the one I hear the most crowing about, had its last release in 2014.
If you were going to point to something freely available, BSD would probably be a better bet in the form of PFSense as it is actually maintained and supported pretty well. Of course the fact that it runs on BSD is incidental to its security, it is (as best we know) secure because it has competent programmers who maintain it regularly.
However the real problem is that for many people, this is just not affordable. When you try and do all your routing and filtering in software on an x64 chip, you find you need a lot of power to push traffic. The CPUs aren't designed with routing in mind so they aren't super fast at it. PFSense needs about a 2.4GHz 4 core atom to push a gigabit of traffic, and then only if the ruleset is reasonably simple. That's about $550 for an appliance from Netgate that can do that, and that is with no wireless. Well for $180 a Netgear R7000 will push a gig of traffic no issue, and comes with a 3x3 802.11ac radio that does 2.4 and 5ghz at the same time. Likewise an EdgeRouter Lite gets a gig and is wired only for $100. They pull that off by having chips with dedicated routing logic on board.
For normal users it also needs to be easy. A suggestion of "Assemble a computer from parts, load Linux, configure routing in text files and you are good," is totally unreasonable. Even something like buying an appliance and loading code on to it from a cold state is out of reach for most people. They need a ready-made solution.
Re: (Score:3)
You know a large number of commercial routers run on Linux, right?
...with a bunch of utter trash piled on top, wherein the exploitable code likely lies, given the large number of individualized signatures this campaign seems to be using.
A basic OpenWRT with only what you need to connect to the Internet has a much smaller code surface. To the extent it looks at the packets above L3 at all, it does so only to build NAT helper rules and for DNS caching. You've got LUCI, dnsmasq, and dropbear listening on the internal network. At worst, you decided you needed uPnP and inst
Re: (Score:1)
An exploit like this can work on anything, it isn't limited just to prepackaged routers.
I suspect this is due to poorly made in-house administration interfaces that are not protected against cross-site request forgery (CSRF) attacks, use default admin credentials, and perhaps have remote code execution vulnerabilities. This combination in particular can be exploited from any javascript code fragment your browser executes, within normal security constraints (no violation of same-origin policy etc required). I have seen even worse cases than that.
Installing a widely-used open source router opera
Re: (Score:2)
Many Buffalo routers run a modified version of DD-WRT. They are cheap, supported and seem to be quite secure.
The most useful advice is to not use the router your ISP provided, or anything by TPLink, Netgear or Linksys. Malware targets popular devices for maximum return on investment, and those three have proven to be incompetent too many times.
Re: (Score:2)
Re: (Score:1)
You have fallen prey to the BSD security myth. They spouted this nonsense a lot about a decade ago. How superior they were. Then a bunch of people simply ported the old, patched Linux vulnerabilities to BSD and they had a bad few years.
They are no better than anyone else (well except Microsoft, everyone is better than they are).
Today to say BSD is more secure is just crazy. They are way behind Linux. SELinux.. and so on and so on. I don't even bother to boot their stuff up anymore and I used to be a real fa
Re: (Score:2)
Re: (Score:2)
How easy is it compared to a real router? Running computers as a router takes too much power, makes too much heat and noises, etc. :(
Re: (Score:2)
Re: (Score:2)
I personally prefer PFSense with 2FA. Bonus points if the config page is on its own segment so most machines can't access it.
Done right, it is extremely hard for malware to get access to the configuration, much less trash it.
it's always JavaScript (Score:5, Insightful)
Yep, NoScript is my default defence (Score:3)
Most sites I simply don't engage if they require any scripting at all.
Before NoScript existed I just left scripting disabled at all times. Now I also use additional selective blocking, ie: all third party scripts, for the few sites that I deem important (banking, Google Maps) to use scripts on.
Nonsense (Score:2)
I'm no guru but you're not making any sense talking about ads. If ads happen to end up blocked then that's just a side effect of poorly constructed website.
Re: (Score:2)
Have a look at uMatrix. It has a very intuituve interface. It's not stopping the scripts, but rather allows you to block connections by type and domain. I find that this cuts down the amount of fiddling with NoScript/Scriptsafe that I used to do.
That's why I encrypted the firmware in my router (Score:5, Funny)
Re: (Score:2)
I pulled all the cables out of mine, more secure than your solution and less labour required.
Netgear (Score:3)
Seriously. What the fuck? Cgi-bin exploits in 2016?
Re: (Score:2)
yep, along with shellshock in 2014...
https://en.wikipedia.org/wiki/... [wikipedia.org]
Re: (Score:2)
Most home routers have similar exploits (executing commands via a web interface while not authenticated), either currently or recently. While I can't defend Netgear in this instance, we also shouldn't falsely make people believe they are the worst of the bunch (IMO DLink is in the running for that honor).
For anyone affected, Netgear has a beta FW update on their support site today. You need to manually upload it to your router via the web console.
More router fun (Score:1)
If this link [192.168.100.1] or this link [192.168.1.1] reboots your router, you should probably also seek new firmware (or better firmware like dd-wrt/openwrt/tomato). It would be fun to embed those as invisible images on Google for a day...
Re: (Score:1)
Jokes on you, my router's ip address is 127.0.0.1. Links won't wor%^&()!@@# __CARRIER LOST
Ads and eyeballs (Score:5, Insightful)
Re: (Score:2, Insightful)
What is wrong with this world?
Nobody in the west is executing criminals.
captcha: contempt
Re: (Score:2)
Nobody in the west is executing criminals.
Unlike browsers, which execute criminal scripts.
Re: (Score:2)
The best ads I've ever seen were from an insurance company, they were well made and really funny. Everybody loved them, and talked about them at the water cooler. "Did you see that ad?", yes of course, but if you asked people to name the insurance company, turns out they forgot.
In contrast, one of the worst ads was from a supermarket. It had a guy literally shou
Ad servers at fault? (Score:5, Interesting)
If you are a web advertising company, why should you ever allow advertising clients to include arbitrary Javascript in their ads? Could you not provide a Javascript library of your own to do the legitimate things ad Javascript might do, and only allow advertising clients to use simple calls into your library?
I'm not knowledgeable about Javascript or web advertising - these are genuine questions, not rhetorical ones.
Re: (Score:3)
Then how would you do things like tracking your users or serving them exploits or show them ads that pop up/under or cover the entire screen?
If ads can't be annoying they would have less value.
Re:Ad servers at fault? (Score:5, Interesting)
The real question is, why do ads require fucking javascript in the first place? Limit ads to static images (JPEG, PNG) and we'll be done with all this nonsense.
Re:Ad servers at fault? (Score:5, Interesting)
While we're at it, I'd also like a law making the ad farm serving the ads legally liable for any damages a malicious ad does. They're the ones in the best position to vet the ads before they're unleashed onto users' browsers. The lack of liability has resulted in them not giving a damn about security, and just accepting anything handed over by anyone wishing to "advertise" and adding it to their ad rotation. If they were liable, we'd probably see them morph into a self-service website where you (1) upload the JPG/GIF you wish displayed as an ad, (2) pick which tracking service you wish to use, and (3) enter the account and ad ID that the tracking service should send the ad impression info to. Don't give "advertisers" the opportunity to script their own ads, make it a cookie cutter form so there's no way to insert anything malicious.
Re: (Score:2)
WebRTC (Score:5, Informative)
which use a WebRTC request to a Mozilla STUN server to determine the user's local IP address
Yay, more garbage Web 3.0 anti-features! In Firefox, go to about:config and set these preferences:
media.peerconnection.enabled = false
media.peerconnection.video.enabled = false
media.peerconnection.turn.disable = true
media.peerconnection.use_document_iceservers = false
Re: (Score:2)
I don't have a problem with features like WebRTC, there is a problem with browsers just allowing it to do things without asking. If you got a message saying, hey this site is trying to make a phone call. Or simply block all code that doesn't originate from the website you're trying to visit.
Re: (Score:2)
Re: (Score:2)
Except that WebRTC is very useful, and (at least in principle) much more secure than most proprietary conferencing services. For example, it has (and mandates) end-to-end encryption, with perfect forward secrecy.
(disclaimer: I work for Mozilla)
Re:WebRTC (Score:4, Insightful)
Well tell the devs to ensure that anytime a web site initiates any kind of WebRTC traffic, the user is asked to okay this (with an option to remember). Make the message clear and easy to understand. Something like, "This web site is trying to initiate a internet telephone or internet video chat connection with another computer. Is this something you asked the web page to do?" Or how about letting the user opt into some kind of safe-webRTC list that tracks known "bad" webrtc connection attempts reported by users.
But maybe we should just stop trying to make a web browser do everything and be its own OS. If an app wants to embed a browser engine as it's primary UI and use WebRTC, that's fine, since we can sandbox it on a per-app basis.
Re: (Score:2)
Well tell the devs to ensure that anytime a web site initiates any kind of WebRTC traffic, the user is asked to okay this (with an option to remember).
This is exactly what's *already* supposed to happen. Otherwise any website could spy on anyone.
But maybe we should just stop trying to make a web browser do everything and be its own OS.
Browsers will keep doing more stuff because people want them to do more. The choice we have is between proprietary binary plugins or actual standards. I'd rather have html5 than flash.
Re: (Score:1)
FF addon uBlock Origin offer a setting to: Prevent WebRTC from leaking local IP addresses. Default setting is off.
A trap for stupid people (Score:1)
I don't get my DHCP and my DNS from my router because I'm not stupid. I have a Beaglebone Black running my DHCP and DNS. Let the dumb fucks try to hack that.
Re: (Score:1)
I get my DHCP and my DNS from dnsmasq in my router because I don't feel the need to have an necessary dongle waving around like an epeen to impress gay hipster idiots.
Summary is misleading (Score:4, Informative)
Because the attack is carried out via the user's browser, using strong router passwords or disabling the administration interface is not enough. The only way users can stay safe is if they update their router's firmware to the most recent versions, which most likely includes protection against the vulnerabilities used by this campaign.
Apparently anonymous reader didn't read the actual article, where it says:
The exploit packages contain vulnerabilities or list of hardcoded admin credentials that can allow the crooks to control the victim's local router.
Updating your firmware will not help with this. It is an issue of admin passwords being left at the default on 99.99% of routers. The admin password is used to change DNS settings on the router, which allows the attackers to redirect any traffic they want.
Re: (Score:1)
Joke's on them then: I have a BT Home Hub 5. Can't change DNS settings on those babies.
How hard can it be? (Score:4, Interesting)
There is some kind of grand conspiracy of unimaginable stupidity going on with router vendors. I cannot for the life of me fathom how it is even possible to implement a consumer router so full of holes. You have to either not give a shit at all or be involved with intentional sabotage to explain the outcomes we are seeing.
Even if routers offered no local authentication whatsoever and just simply checked HTTP_REFERER first this crap would fail outright. What is it... 2...3..4..5.. lines of code max and whole categories of remote exploitation possibilities disappear overnight.
Unbelievable how f*****lame these exploits continue to be and how vendors are not in any way held accountable for not even trying.
Re: (Score:2)
Yes, another obstacle to cross, but HTTP_REFERER also can be spoofed. You would effectively have to implement an authentication scheme with HTTP_REFERER to achieve anything but a temporary effect.
No it can't, not by your *BROWSER*. Any avenue to spoof is a security bug and has been treated as such for at least a decade.
My comments are not about absolute protection of router from local access by a malicious HTTP client it is about preventing CSRF the lowest hanging fruit out there.
Hosts files work vs. this threat (Score:1, Insightful)
See subject: Blocking out both javascript downloaded from adserver domains & other parts in servers used in this malware's communication:
0.0.0.0 onclickads.net
0.0.0.0 popcash.net
0.0.0.0 cdn.taboola.com
0.0.0.0 taboola.com
0.0.0.0 widgets.outbrain.com
0.0.0.0 outbrain.com
0.0.0.0 cdn.engine.4dsply.com
0.0.0.0 engine.4dsply.com
0.0.0.0 4dsply.com
0.0.0.0 cdn.engine.phn.doublepimp.com
0.0.0.0 phn.doublepimp.com
0.0.0.0 doublepimp.com
0.0.0.0 modificationserver.com
0.0.0.0 expensiveserver.com
0.0.0.0 immediatelyserver.
For more protection vs. threats like this? (Score:1)
See subject & best hosts file creator APK Hosts File Engine 9.0++ SR-4 32/64-bit https://www.google.com/search?... [google.com]
Ads rob speed, security (malvertising) & privacy (tracking).
Hosts add speed (hardcodes/adblocks), security (bad sites/poisoned dns), reliability (dns down), & anonymity (dns requestlogs/trackers) natively.
Works vs. caps & PUSH ads.
Avg. page = big as Doom http://www.theregister.co.uk/2... [theregister.co.uk] & ads = 40% of it.
Hosts != ClarityRay blockable (vs. souled-out to admen inferior wastefu
Re: For more protection vs. threats like this? (Score:1, Funny)
You're like an ad. What's the hosts entry to block you?
Patched it 4 years ago on my DD-WRT router (Score:1)
Change your routers pw (Score:2)