Android Trojan Performs DNS Hijacking Attacks against Wireless Routers

Android Trojan Performs DNS Hijacking Attacks against Wireless Routers

5020
0

A new Android trojan targets wireless routers and performs DNS hijacking instead of attacking users directly.
Kaspersky Lab found that the trojan, dubbed Trojan.AndroidOS.Switcher, generally adopts one of two disguises. The first facade (com.baidu.com) is a fake mobile client for the Chinese search engine Baidu. The second (com.snda.wifi) is a fake version of another app that allows users to share information about public Wi-Fi networks.
Once a user downloads one of the two camouflaged applications, Switcher gets to work. It first obtains the BSSID, or the MAC address of the wireless access point (WAP), and informs its command and control (C&C) server. It then tries to identify the ISP to determine which of its three rogue DNS servers it should use: 101.200.147.153, 112.33.13.11, and 120.76.249.59.
Next, the trojan performs a brute-force attack using a number of predefined usernames and passwords. As of this writing, its attack code works against only TP-LINK Wi-Fi routers.
Attackers can use those two rogue DNS servers to steer anyone who accesses the web through the compromised router away from their desired destination. If a user searches for Google.com, for example, the bad actors can redirect them to a site that’s laden with malware under their control. Alternatively, they can save all of a user’s search results and web traffic.

Source: https://www.tripwire.com/state-of-security/latest-security-news/android-trojan-performs-dns-hijacking-attacks-wireless-routers/
Submitted by: Arnfried Walbrecht

NO COMMENTS

Comments are closed.