Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Advertising Security Privacy Software

Malvertising Campaign Infects Your Router Instead of Your Browser (bleepingcomputer.com) 137

An anonymous reader quotes a report from BleepingComputer: Malicious ads are serving exploit code to infect routers, instead of browsers, in order to insert ads in every site users are visiting. Unlike previous malvertising campaigns that targeted users of old Flash or Internet Explorer versions, this campaign focused on Chrome users, on both desktop and mobile devices. The malicious ads included in this malvertising campaign contain exploit code for 166 router models, which allow attackers to take over the device and insert ads on websites that didn't feature ads, or replace original ads with the attackers' own. Researchers haven't yet managed to determine an exact list of affected router models, but some of the brands targeted by the attackers include Linksys, Netgear, D-Link, Comtrend, Pirelli, and Zyxel. Because the attack is carried out via the user's browser, using strong router passwords or disabling the administration interface is not enough. The only way users can stay safe is if they update their router's firmware to the most recent versions, which most likely includes protection against the vulnerabilities used by this campaign. The "campaign" is called DNSChanger EK and works when attackers buy ads on legitimate websites and insert malicious JavaScript in these ads, "which use a WebRTC request to a Mozilla STUN server to determine the user's local IP address," according to BleepingComputer. "Based on this local IP address, the malicious code can determine if the user is on a local network managed by a small home router, and continue the attack. If this check fails, the attackers just show a random legitimate ad and move on. For the victims the crooks deem valuable, the attack chain continues. These users receive a tainted ad which redirects them to the DNSChanger EK home, where the actual exploitation begins. The next step is for the attackers to send an image file to the user's browser, which contains an AES (encryption algorithm) key embedded inside the photo using the technique of steganography. The malicious ad uses this AES key to decrypt further traffic it receives from the DNSChanger exploit kit. Crooks encrypt their operations to avoid the prying eyes of security researchers."
This discussion has been archived. No new comments can be posted.

Malvertising Campaign Infects Your Router Instead of Your Browser

Comments Filter:
  • by ls671 ( 1122017 ) on Wednesday December 14, 2016 @07:51PM (#53487273) Homepage

    Just configure a Linux router and be done with this non-sense (flashing your router, etc.). That's what I have been doing since 1995.

    • Re: Linux router (Score:5, Interesting)

      by ArmoredDragon ( 3450605 ) on Wednesday December 14, 2016 @07:55PM (#53487295)

      Better yet, I'd just say that it's your duty to use an ad blocker, mich like it was to use antivirus software in the past.

      • by starless ( 60879 )

        Better yet, I'd just say that it's your duty to use an ad blocker, mich like it was to use antivirus software in the past.

        The trouble is that more and more sites are now not allowing you to access them without turning off your ad-blocker.
        So far I've been avoiding those sites, but if the trend continues I might have to do so for at least some sites...

        • The trouble is that more and more sites are now not allowing you to access them without turning off your ad-blocker.

          Indeed, there is the German tabloid "Bild Zeitung" which does this (no big loss...). Which other site does this?

          And, if you are so inclined, Bild's block is easy to subvert: just do View->PageStyle->NoStyle. Yeah, "No Style", quite fitting for that rag.

          • by starless ( 60879 )

            Indeed, there is the German tabloid "Bild Zeitung" which does this (no big loss...). Which other site does this?

            Forbes and Wired are the ones I notice the most.

            • No problem with Wired here.

              For Forbes however, you're right. Interesting to see that they've sunk down to the level of Bildzeitung...

        • by Cramer ( 69040 )

          That's a game of whack-a-mole. It only takes a few minutes to break their anti-adblocker bullshit. At the end of the day, it's my browser; I control what it does or does not do. Pornhub started randomizing ids, which you'd think would kill adbolckers, but they've done it so wrong, it's only two mouse clicks to defeat. cpu-world, despite their (impressive) highly complicated, multi-thousand line crap, is defeated by a single rule.

      • Re: Linux router (Score:4, Insightful)

        by KiloByte ( 825081 ) on Thursday December 15, 2016 @12:54AM (#53488097)

        Yes, ads are malware. They waste your time, attention, bandwidth and battery time, and run hostile third-party code on your machine.

        Let's take a look at Wikipedia [wikipedia.org] take at it:

        Malware, short for malicious software, is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising.

        Check, check, check and check.

      • by AmiMoJo ( 196126 )

        Some banks require you to use anti-virus software. If you don't and your money is stolen, they will try to blame you and not pay out.

        I'm just waiting for the first bank to start asking customers if they run an ad-blocker and then claiming the lack of one is poor security and shifts the liability on to the account holder.

    • by Anonymous Coward

      I use a Pentium space heater from 1995 as my router, because I love the soothing roar of fan noise, and Linux saves me so much money on the heating bill.

    • I was using a Belkin router w/ my PC-BSD laptop, and I'd occasionally get under Chromium an ad where a voice announcement would start and there was no way I could even close the browser - it just seemed to lock it. My only escape was to log out and back in. I ultimately changed the router for a Netgear and escaped the problem.

      I wish I could know how to trouble shoot it so that the router could be fixed.

    • by Sycraft-fu ( 314770 ) on Thursday December 15, 2016 @02:38AM (#53488359)

      You know a large number of commercial routers run on Linux, right? The Linux kernel isn't some magic sauce that makes you immune to hacking. On the contrary, we see flaws in programs that run on Linux all the time, these being one of them. An exploit like this can work on anything, it isn't limited just to prepackaged routers.

      So what you mean is get an x64 system and run a Linux distro, with some built in tools for configuring routing. Ok... So long as it doesn't have any bugs they can exploit or check for, you are fine. If it does, well then you are back to having to update... if an update is available. A lot of the router-type Linux distros aren't very well maintained. Smoothwall, the one I hear the most crowing about, had its last release in 2014.

      If you were going to point to something freely available, BSD would probably be a better bet in the form of PFSense as it is actually maintained and supported pretty well. Of course the fact that it runs on BSD is incidental to its security, it is (as best we know) secure because it has competent programmers who maintain it regularly.

      However the real problem is that for many people, this is just not affordable. When you try and do all your routing and filtering in software on an x64 chip, you find you need a lot of power to push traffic. The CPUs aren't designed with routing in mind so they aren't super fast at it. PFSense needs about a 2.4GHz 4 core atom to push a gigabit of traffic, and then only if the ruleset is reasonably simple. That's about $550 for an appliance from Netgate that can do that, and that is with no wireless. Well for $180 a Netgear R7000 will push a gig of traffic no issue, and comes with a 3x3 802.11ac radio that does 2.4 and 5ghz at the same time. Likewise an EdgeRouter Lite gets a gig and is wired only for $100. They pull that off by having chips with dedicated routing logic on board.

      For normal users it also needs to be easy. A suggestion of "Assemble a computer from parts, load Linux, configure routing in text files and you are good," is totally unreasonable. Even something like buying an appliance and loading code on to it from a cold state is out of reach for most people. They need a ready-made solution.

      • by skids ( 119237 )

        You know a large number of commercial routers run on Linux, right?

        ...with a bunch of utter trash piled on top, wherein the exploitable code likely lies, given the large number of individualized signatures this campaign seems to be using.

        A basic OpenWRT with only what you need to connect to the Internet has a much smaller code surface. To the extent it looks at the packets above L3 at all, it does so only to build NAT helper rules and for DNS caching. You've got LUCI, dnsmasq, and dropbear listening on the internal network. At worst, you decided you needed uPnP and inst

      • by Anonymous Coward

        An exploit like this can work on anything, it isn't limited just to prepackaged routers.

        I suspect this is due to poorly made in-house administration interfaces that are not protected against cross-site request forgery (CSRF) attacks, use default admin credentials, and perhaps have remote code execution vulnerabilities. This combination in particular can be exploited from any javascript code fragment your browser executes, within normal security constraints (no violation of same-origin policy etc required). I have seen even worse cases than that.

        Installing a widely-used open source router opera

      • by AmiMoJo ( 196126 )

        Many Buffalo routers run a modified version of DD-WRT. They are cheap, supported and seem to be quite secure.

        The most useful advice is to not use the router your ISP provided, or anything by TPLink, Netgear or Linksys. Malware targets popular devices for maximum return on investment, and those three have proven to be incompetent too many times.

      • by pnutjam ( 523990 )
        Pick up a Mikrotik device running RouterOS, they have them for under $40 with wireless.
      • by ebvwfbw ( 864834 )

        You have fallen prey to the BSD security myth. They spouted this nonsense a lot about a decade ago. How superior they were. Then a bunch of people simply ported the old, patched Linux vulnerabilities to BSD and they had a bad few years.

        They are no better than anyone else (well except Microsoft, everyone is better than they are).

        Today to say BSD is more secure is just crazy. They are way behind Linux. SELinux.. and so on and so on. I don't even bother to boot their stuff up anymore and I used to be a real fa

    • by antdude ( 79039 )

      How easy is it compared to a real router? Running computers as a router takes too much power, makes too much heat and noises, etc. :(

      • by pnutjam ( 523990 )
        You can pick up microtik router for under $40, their routerOS is not open source, but it's very powerful. They also support wireless better then bsd or linux and many of their low cost routers have wireless.
    • by mlts ( 1038732 )

      I personally prefer PFSense with 2FA. Bonus points if the config page is on its own segment so most machines can't access it.

      Done right, it is extremely hard for malware to get access to the configuration, much less trash it.

  • by turkeydance ( 1266624 ) on Wednesday December 14, 2016 @07:54PM (#53487283)
    well, it seems that way.
    • Most sites I simply don't engage if they require any scripting at all.

      Before NoScript existed I just left scripting disabled at all times. Now I also use additional selective blocking, ie: all third party scripts, for the few sites that I deem important (banking, Google Maps) to use scripts on.

  • by jfdavis668 ( 1414919 ) on Wednesday December 14, 2016 @07:55PM (#53487293)
    Of course, it doesn't work any more, but now I am safe.
  • by 110010001000 ( 697113 ) on Wednesday December 14, 2016 @08:01PM (#53487313) Homepage Journal
    This fits in nicely with the recent attack that works on Netgear routers where you can execute a cgi-bin script as root without authorization. http://lifehacker.com/psa-seve... [lifehacker.com]

    Seriously. What the fuck? Cgi-bin exploits in 2016?
    • by ls671 ( 1122017 )

      yep, along with shellshock in 2014...

      https://en.wikipedia.org/wiki/... [wikipedia.org]

    • Most home routers have similar exploits (executing commands via a web interface while not authenticated), either currently or recently. While I can't defend Netgear in this instance, we also shouldn't falsely make people believe they are the worst of the bunch (IMO DLink is in the running for that honor).

      For anyone affected, Netgear has a beta FW update on their support site today. You need to manually upload it to your router via the web console.

  • by Anonymous Coward

    If this link [192.168.100.1] or this link [192.168.1.1] reboots your router, you should probably also seek new firmware (or better firmware like dd-wrt/openwrt/tomato). It would be fun to embed those as invisible images on Google for a day...

    • by Anonymous Coward

      Jokes on you, my router's ip address is 127.0.0.1. Links won't wor%^&()!@@# __CARRIER LOST

  • Ads and eyeballs (Score:5, Insightful)

    by JaredOfEuropa ( 526365 ) on Wednesday December 14, 2016 @08:11PM (#53487341) Journal
    Everybody hates ads, but in the end, it is ads that drove the value of companies like Google and Facebook to ridiculous heights (in fact it drove the last Internet bubble), and is now encouraging criminals to go to ridiculous lengths to serve us their ads instead of legitimate ones. What is wrong with this world?
    • Re: (Score:2, Insightful)

      by Anonymous Coward

      What is wrong with this world?

      Nobody in the west is executing criminals.

      captcha: contempt

      • by GuB-42 ( 2483988 )

        Nobody in the west is executing criminals.

        Unlike browsers, which execute criminal scripts.

  • Ad servers at fault? (Score:5, Interesting)

    by Michael Woodhams ( 112247 ) on Wednesday December 14, 2016 @08:11PM (#53487343) Journal

    If you are a web advertising company, why should you ever allow advertising clients to include arbitrary Javascript in their ads? Could you not provide a Javascript library of your own to do the legitimate things ad Javascript might do, and only allow advertising clients to use simple calls into your library?

    I'm not knowledgeable about Javascript or web advertising - these are genuine questions, not rhetorical ones.

    • by guruevi ( 827432 )

      Then how would you do things like tracking your users or serving them exploits or show them ads that pop up/under or cover the entire screen?

      If ads can't be annoying they would have less value.

    • by Yvan256 ( 722131 ) on Wednesday December 14, 2016 @08:38PM (#53487423) Homepage Journal

      The real question is, why do ads require fucking javascript in the first place? Limit ads to static images (JPEG, PNG) and we'll be done with all this nonsense.

      • by Solandri ( 704621 ) on Wednesday December 14, 2016 @08:55PM (#53487463)
        That's what I'd like - an ad blocker which lets static images through but blocks any scripting or flash or other weirdness. That way instead of websites having to beg me to turn off my ad blocker, I can just tell them to find an advertiser who only serves static ads. And hopefully that would exert some pressure on the industry to abandon scripted ads in favor of static ads.

        While we're at it, I'd also like a law making the ad farm serving the ads legally liable for any damages a malicious ad does. They're the ones in the best position to vet the ads before they're unleashed onto users' browsers. The lack of liability has resulted in them not giving a damn about security, and just accepting anything handed over by anyone wishing to "advertise" and adding it to their ad rotation. If they were liable, we'd probably see them morph into a self-service website where you (1) upload the JPG/GIF you wish displayed as an ad, (2) pick which tracking service you wish to use, and (3) enter the account and ad ID that the tracking service should send the ad impression info to. Don't give "advertisers" the opportunity to script their own ads, make it a cookie cutter form so there's no way to insert anything malicious.
  • WebRTC (Score:5, Informative)

    by Motherfucking Shit ( 636021 ) on Wednesday December 14, 2016 @08:14PM (#53487353) Journal

    which use a WebRTC request to a Mozilla STUN server to determine the user's local IP address

    Yay, more garbage Web 3.0 anti-features! In Firefox, go to about:config and set these preferences:

    media.peerconnection.enabled = false
    media.peerconnection.video.enabled = false
    media.peerconnection.turn.disable = true
    media.peerconnection.use_document_iceservers = false

    • by guruevi ( 827432 )

      I don't have a problem with features like WebRTC, there is a problem with browsers just allowing it to do things without asking. If you got a message saying, hey this site is trying to make a phone call. Or simply block all code that doesn't originate from the website you're trying to visit.

    • by raind ( 174356 )
      Using latest FF update 50.1.0 last two were not listed in about:config - thanks though...
    • by jmv ( 93421 )

      Except that WebRTC is very useful, and (at least in principle) much more secure than most proprietary conferencing services. For example, it has (and mandates) end-to-end encryption, with perfect forward secrecy.

      (disclaimer: I work for Mozilla)

      • Re:WebRTC (Score:4, Insightful)

        by caseih ( 160668 ) on Thursday December 15, 2016 @01:09AM (#53488155)

        Well tell the devs to ensure that anytime a web site initiates any kind of WebRTC traffic, the user is asked to okay this (with an option to remember). Make the message clear and easy to understand. Something like, "This web site is trying to initiate a internet telephone or internet video chat connection with another computer. Is this something you asked the web page to do?" Or how about letting the user opt into some kind of safe-webRTC list that tracks known "bad" webrtc connection attempts reported by users.

        But maybe we should just stop trying to make a web browser do everything and be its own OS. If an app wants to embed a browser engine as it's primary UI and use WebRTC, that's fine, since we can sandbox it on a per-app basis.

        • by jmv ( 93421 )

          Well tell the devs to ensure that anytime a web site initiates any kind of WebRTC traffic, the user is asked to okay this (with an option to remember).

          This is exactly what's *already* supposed to happen. Otherwise any website could spy on anyone.

          But maybe we should just stop trying to make a web browser do everything and be its own OS.

          Browsers will keep doing more stuff because people want them to do more. The choice we have is between proprietary binary plugins or actual standards. I'd rather have html5 than flash.

    • by Anonymous Coward

      FF addon uBlock Origin offer a setting to: Prevent WebRTC from leaking local IP addresses. Default setting is off.

  • I don't get my DHCP and my DNS from my router because I'm not stupid. I have a Beaglebone Black running my DHCP and DNS. Let the dumb fucks try to hack that.

    • by Anonymous Coward

      I get my DHCP and my DNS from dnsmasq in my router because I don't feel the need to have an necessary dongle waving around like an epeen to impress gay hipster idiots.

  • by Anonymous Coward on Wednesday December 14, 2016 @09:26PM (#53487537)

    Because the attack is carried out via the user's browser, using strong router passwords or disabling the administration interface is not enough. The only way users can stay safe is if they update their router's firmware to the most recent versions, which most likely includes protection against the vulnerabilities used by this campaign.

    Apparently anonymous reader didn't read the actual article, where it says:

    The exploit packages contain vulnerabilities or list of hardcoded admin credentials that can allow the crooks to control the victim's local router.

    Updating your firmware will not help with this. It is an issue of admin passwords being left at the default on 99.99% of routers. The admin password is used to change DNS settings on the router, which allows the attackers to redirect any traffic they want.

  • How hard can it be? (Score:4, Interesting)

    by WaffleMonster ( 969671 ) on Wednesday December 14, 2016 @11:30PM (#53487867)

    There is some kind of grand conspiracy of unimaginable stupidity going on with router vendors. I cannot for the life of me fathom how it is even possible to implement a consumer router so full of holes. You have to either not give a shit at all or be involved with intentional sabotage to explain the outcomes we are seeing.

    Even if routers offered no local authentication whatsoever and just simply checked HTTP_REFERER first this crap would fail outright. What is it... 2...3..4..5.. lines of code max and whole categories of remote exploitation possibilities disappear overnight.

    Unbelievable how f*****lame these exploits continue to be and how vendors are not in any way held accountable for not even trying.

  • by Anonymous Coward

    See subject: Blocking out both javascript downloaded from adserver domains & other parts in servers used in this malware's communication:

    0.0.0.0 onclickads.net
    0.0.0.0 popcash.net
    0.0.0.0 cdn.taboola.com
    0.0.0.0 taboola.com
    0.0.0.0 widgets.outbrain.com
    0.0.0.0 outbrain.com
    0.0.0.0 cdn.engine.4dsply.com
    0.0.0.0 engine.4dsply.com
    0.0.0.0 4dsply.com
    0.0.0.0 cdn.engine.phn.doublepimp.com
    0.0.0.0 phn.doublepimp.com
    0.0.0.0 doublepimp.com
    0.0.0.0 modificationserver.com
    0.0.0.0 expensiveserver.com
    0.0.0.0 immediatelyserver.

  • Luckily i already heard of this theoretical method years ago and have patched my router accordingly. I run a DD-WRT router so the flexibility is endless, on bootup a script runs that kills the webservice and then restarts it on a non standard port. So next time i get "infected" with this exploit kit, all they can do is endlessly scan my network for routers and once they find it they have no preprogrammed way of connecting.
  • from username, password and the code moves on.

If all else fails, lower your standards.

Working...