DNSChanger卷土重来,家用路由器当心了

圣诞节快来了,各类打折活动即将到来,与此同时,新型的恶意软件已经上线。

下图展示研究人员捕获的流量DNSChanger卷土重来,家用路由器当心了

DNSChanger这个名字,大家或许有所耳闻。这款恶意软件曾在2012年感染了全世界范围内数百万台电脑。

近日,ProofPoint的研究人员发现了升级版的DNSChanger EK(漏洞利用工具包),它利用恶意广告传播。在感染用户设备后,这个漏洞利用套装将修改路由器DNS服务器条目,指向攻击者控制的恶意DNS服务器。感染后,若用户想访问某个网页,恶意DNS服务器可能将用户导向钓鱼网站。攻击者还可能植入广告、重新定向搜索结果、在网站上挂马等。

据ProofPoint发表的报告,升级版DNSChanger EK从十月底开始活跃,与最近的一系列恶意广告攻击活动有关。DNSChanger EK通过用户浏览器攻击路由器,它利用的并不是浏览器或设备的漏洞,而是家用路由器中的漏洞,而且似乎囊括了众多已知的路由器exploit。DNSChanger EK一般通过Windows台式机和Android设备中的Chrome浏览器展开攻击。但是,一旦路由器被攻击之后,所有连接该路由器的用户,无论其使用哪个操作系统和浏览器,都会遭受进一步的攻击。

DNSChanger EK攻击路由器的行为似乎与最近几波恶意广告攻击活动有关。在分析其攻击模式和感染链之后,研究人员得出结论,这些行为与2015年上半年出现的“跨站请求伪造Soho网址嫁接(CSRF Soho Pharming)”为同一攻击者(或组织)所为。

不过,对比2015年的活动,研究人员发现了最近这波攻击的新特点:

  • 1.  内部地址的外部DNS解析
  • 2.  用隐写术隐藏:
  •     1)  AES密钥,用于解密fingerprint/默认凭证和本地解析的列表
  •     2)  攻击目标路由器的命令的部署
  • 3.  新增十多个路由器exploit:现有166个fingerprint,其中有些影响了数个路由器型号,而在2015年,只有55个fingerprint。比如,针对“Comtrend ADSL Router CT-5367/5624”路由器的exploit几周前刚出现(2016年9月13日),而攻击大约始于10月28日。
  • 4.  在36个案例中,这个漏洞利用工具包修改了网络规则,使外部地址可以访问管理端口,导致路由器可遭受进一步攻击,比如被Mirai僵尸网络感染等。
  • 5.  Android设备也已成为此类攻击的媒介。

攻击链:

攻击者通过合法网站中的恶意广告,诱捕用户的网络。

完整攻击过程如图所示:

DNSChanger卷土重来,家用路由器当心了

下图展示研究人员捕获的流量

DNSChanger卷土重来,家用路由器当心了

攻击分析:

用户点击电脑端或手机端的恶意广告后,会向DNSChanger EK发送流量。

DNSChanger EK通过stun.services.mozilla[.]com向Mozilla STUN服务器发送WebRTC请求,获得用户的本地IP地址。如果用户的公共IP地址已知或者他们的本地IP不在目标范围,将向用户显示某第三方广告商发布的合法广告。否则,用户将看到一个恶意广告。JavaScript从PNG文件的注释字段中提取HTML代码,将用户重新定向至含有DNSChanger EK的页面。注意下图中的(1)图是假广告,而且并不是.jpg文件,而是PNG文件。

DNSChanger卷土重来,家用路由器当心了

DNSChanger EK再次通过STUN请求核对用户的本地IP地址。随后,DNSChanger EK开始加载多个函数,并且用隐写术将一个AES密钥隐藏在一张小图片中。

DNSChanger卷土重来,家用路由器当心了

这个密钥将被用于解密一个fingerprint列表,除去重复项后,该列表包含129个条目(完整列表见附件)。

DNSChanger卷土重来,家用路由器当心了

用户的浏览器会尝试定位并识别网络中的路由器(上图)。浏览器运行搜索函数后,将向DNSChanger EK回传报告,DNSChanger EK将向浏览器返回指令,向路由器发起攻击。

DNSChanger卷土重来,家用路由器当心了

DNSChanger卷土重来,家用路由器当心了

浏览器搜索过程中发现的特定路由器模型,将决定攻击的具体方式:如果没有可用的exploit,将尝试默认登陆凭证(如admin:admin、admin:1234、admin:password、admin:12345等);如果有可用的exploit,将修改路由器中的DNS条目,如果可能的话(129个fingerprint中有36个能够做到),将向外部地址开放管理端口,可致使路由器遭受进一步攻击,比如被Mirai僵尸网络感染等。

DNSChanger卷土重来,家用路由器当心了

DNSChanger卷土重来,家用路由器当心了

感染后:

研究人员表示,此类修改路由器DNS攻击的目的通常无法明确,但在此案例中,他们至少确定了其中一个动机。对比了可信的公共DNS服务器和上述流氓服务器的DNS解析,研究人员发现攻击者主要目的是要盗取一些大型网页广告商的流量。

DNSChanger卷土重来,家用路由器当心了

攻击者强制将对应的域解析为193.238.153[.]10或46.166.160[.]187。根据各域的不同,攻击者可能将修改广告行为,修改目标网站(比如,点击页面任意位置可弹窗),或者将原广告替换。

DNSChanger卷土重来,家用路由器当心了

研究人员调查时发现,攻击者将流量导向Fogzy(a.rfgsi[.]com)和TrafficBroker,并已联系这些机构,以获得更多信息,并告知他们网络中有流量遭盗取。

影响范围

因为未能获得受害者方的fingerprint数据和相应路由器之间的关联,研究人员无法提供完整的受此威胁影响的路由器列表。但是,因为这个工具包整合了所有已知的exploit,研究人员建议用户将所有路由器的固件更新至已知的最新版本。

研究人员发现,至少有以下几种路由器受到影响:

  • D-Link DSL-2740R
  • COMTREND ADSL Router  CT-5367 C01_R12
  • NetGear WNDR3400v3 (and likely other models in this series)
  • Pirelli ADSL2/2+ Wireless Router P.DGA4001N
  • Netgear R6200

此外,Netgear的R7000、R6400及其他型号的路由器曾曝出0-day exploit。ProofPoint也特别检查了DNSChanger中与这些型号有关的fingerprint,但是截止2016年12月12日,并未发现相关fingerprint。不过,研究人员依然建议用户听从US-CERT给出的建议,禁用受影响Netgear路由器上的web服务器,因为他们预计不久后上述0-day exploit也将被添加至DNSChanger EK中。Netgear也针对曝出的漏洞发布了多个beta版的固件,用户可及时下载更新。

在很多情况下,只要关闭家用路由器的远程管理功能就可以提高其安全性。但在本案例中,攻击者利用的是网络中的某个设备上的有线或无限连接。因此,不需要开启远程管理,攻击者也可以成功修改路由器设置。

缓解措施

DNSChanger卷土重来,家用路由器当心了

很不幸,目前没有简单的方法可以抵御此类攻击。目前最佳的缓解方案是更新路由器至最新版本。修改默认的本地IP地址范围,可能也会起到一定保护作用。此外,一些拦截广告的浏览器插件也可起到一定作用,毕竟此类攻击始于恶意广告。

结语

当攻击者控制了某个网络中的DNS服务器,该网络中的设备可能遭遇各种恶意攻击,包括银行欺诈、中间人攻击、钓鱼、广告欺诈及其他。在这个案例中,DNSChanger EK允许攻击者利用家用网络中的唯一一个DNS服务器,也就是互联网路由器本身。总体而言,要避免此类攻击则要求路由器制造商定期修复固件,用户定期更新补丁。

附录

IoC:

Domain | IP Comment
modificationserver.com | 93.115.28.248 Malvertising Step 2 in front of the EK – 2016-12
expensiveserver.com | 46.28.67.21 Malvertising Step 1 in front of the EK – 2016-12
immediatelyserver.com Malvertising in front of the EK – 2016-11
respectsserver.com | 217.12.220.127 Malvertising Step1  in front of the EK – 2016-10
ad.reverencegserver.com Malvertising Step2  in front of the EK – 2016-10
parametersserver.com|93.115.28.249 DNSChanger EK/ RouterEK – 2016-12
phosphateserver.com DNSChanger EK/ RouterEK – 2016-11
cigaretteinserver.com DNSChanger EK/ RouterEK – 2016-10
From 46.17.102.10 up to 24 Rogue DNS Servers
From 5.39.220.117 up to 126 Rogue DNS Servers
From 217.12.218.114 up to 121 Rogue DNS Servers
From 93.115.31.194 up to 244 Rogue DNS Servers
193.238.153.10 and 46.166.160.187 Substituted IP for targeted traffic (impersonating server) Traffic to that host is most probably a symptom of DNS entries modified on the router.
pix1.payswithservers.com External domain for 192.168.1.1
pix2.payswithservers.com External domain for 192.168.8.1
pix3.payswithservers.com External domain for 192.168.178.1
pix4.payswithservers.com External domain for 192.168.0.1
pix5.payswithservers.com External domain for 192.168.10.1
pix6.payswithservers.com External domain for 192.168.137.1
pix7.payswithservers.com External domain for 10.10.10.1
pix8.payswithservers.com External domain for 192.168.100.1
pix9.payswithservers.com External domain for 10.1.1.1
pix10.payswithservers.com External domain for 10.0.0.1
pix11.payswithservers.com External domain for 192.168.2.1
pix12.payswithservers.com External domain for 192.168.254.1
pix13.payswithservers.com External domain for 192.168.11.1
pix14.payswithservers.com External domain for 192.168.3.1
sub[i].domain254.com for   0 < i < 18 Not resolving
sub16.domain.com Resolving to 66.96.162.92
sub17.domain.com Resolving to 66.96.162.92

部分ET签名:

2023473 || ET CURRENT_EVENTS DNSChanger EK Secondary Landing Oct 31 2016

2021090 || ET CURRENT_EVENTS DNSChanger EK Landing May 12 2015

2023466 || ET EXPLOIT D-Link DSL-2740R Remote DNS Change Attempt

2020487 || ET EXPLOIT Generic ADSL Router DNS Change GET Request

2020488 || ET EXPLOIT Generic ADSL Router DNS Change POST Request

2020854 || ET CURRENT_EVENTS DRIVEBY Router DNS Changer Apr 07 2015

2020856 || ET EXPLOIT TP-LINK TL-WR340G Router DNS Change GET Request

2020857 || ET EXPLOIT Belkin Wireless G Router DNS Change POST Request

2020858 || ET EXPLOIT Linksys WRT54GL Router DNS Change POST Request

2020859 || ET EXPLOIT Netgear WNDR Router DNS Change POST Request

2020861 || ET EXPLOIT Motorola SBG900 Router DNS Change GET Request

2020862 || ET EXPLOIT ASUS RT N56U Router DNS Change GET Request 1

2020863 || ET EXPLOIT ASUS RT N56U Router DNS Change GET Request 2

2020871 || ET EXPLOIT ASUS RT N56U Router DNS Change GET Request 3

2020873 || ET EXPLOIT D-link DI604 Known Malicious Router DNS Change GET Request

2020874 || ET EXPLOIT Netgear DGN1000B Router DNS Change GET Request

2020875 || ET EXPLOIT Belkin G F5D7230-4 Router DNS Change GET Request

2020876 || ET EXPLOIT Tenda ADSL2/2+ Router DNS Change GET Request

2020877 || ET EXPLOIT Known Malicious Router DNS Change GET Request

2020878 || ET EXPLOIT TP-LINK TL-WR841N Router DNS Change GET Request

2020896 || ET CURRENT_EVENTS DRIVEBY Router DNS Changer Apr 07 2015 M2

2023467 || ET EXPLOIT COMTREND ADSL Router CT-5367 Remote DNS Change Attempt

2023468 || ET EXPLOIT Unknown Router Remote DNS Change Attempt

2023628 || ET EXPLOIT Netgear R7000 Command Injection Exploit

2823788 || ETPRO TROJAN DNSChanger Rogue DNS Server (A Lookup)

2823811 || ETPRO CURRENT_EVENTS DNSChanger EK DNS Reply Adfraud Server 1 Dec 12 2016

2823812 || ETPRO CURRENT_EVENTS DNSChanger EK DNS Reply Adfraud Server 2 Dec 12 2016

fingerprint列表:

[-37,"/img/Netgeargenie.png",290,41,"0",0]

[-36,"/UILinksys.gif",165,57,"0",0]

[-32,"/redbull.gif",7,7,"1",0]

[-31,"/settings.gif",654,111,"0",0]

[-30,"/images/img_masthead.jpg",836,92,"0",0]

[-29,"/images/logo.png",183,46,"0",0]

[-28,"/images/top1_1.jpg",280,87,"1",0]

[-27,"/headlogoa.gif",370,78,"0",0]

[-26,"/image/logo_gn.gif",101,51,"0",0]

[-25,"/bg_logo.jpg",858,82,"0",0]

[-24,"/image/tops.gif",450,92,"0",0]

[-23,"/graphics/banner.png",1024,70,"1",0]

[-22,"/img/loading.gif",32,32,"0",0]

[-21,"/logo_corp.gif",95,50,"1",0]

[-20,"/img/banner.gif",778,60,"0",0]

[-19,"/down_02.jpg",133,75,"0",0]

[-18,"/redbull.gif",7,7,"0",0]

[-17,"/pic/head_01.gif",162,92,"0",0]

[-16,"/image/linksys_logo.png",230,30,"0",0]

[-15,"/file/Comtrend_banner.jpg",897,70,"1",0]

[-13,"/logo.gif",371,38,"1",0]

[-12,"/image/top/NETGEAR_Genie.png",512,60,"1",0]

[-11,"/img/Netgeargenie.png",290,41,"",0]

[-10,"/tmp.gif",700,54,"1",0]

[-9,"/wlan_masthead.gif",836,92,"0",0]

[-8,"/images/logo.png",146,38,"0",0]

[-6,"/image/top/logo.gif",300,38,"0",0]

[-4,"/button_log_in.gif",70,21,"0",0]

[-3,"/image/UI_Linksys.gif",166,58,"1",0]

[-2,"/smclg.gif",133,59,"0",0]

[-1,"/themes/TM04/Drift-logo.png",300,89,"0",0]

[0,"/graphics/topbar.jpg",900,69,"1",1]

[1,"/graphics/young.png",128,96,"1",0]

[2,"/images/bg_stripes.png",50,50,"1",0]

[3,"/image/logo.png",271,43,"0",0]

[5,"/images/logo.gif",133,59,"0",0]

[8,"/img/tenda-logo-big.png",199,45,"0",0]

[9,"/images/main_welcome.gif",850,179,"1",1]

[11,"/image/UI_Linksys.gif",288,58,"0",0]

[12,"/Images/img_masthead_red.gif",856,92,"0",0]

[13,"/settings.gif",750,85,"0",0]

[14,"/images/top-02.gif",359,78,"1",0]

[15,"/UI_Linksys.gif",165,57,"1",0]

[16,"/set_bt.gif",93,52,"0",1]

[18,"/images/top1_1.jpg",208,85,"1",0]

[19,"/graphics/head_logo.gif",121,64,"0",0]

[20,"/images/top1_1.jpg",280,87,"0",0]

[21,"/router_logo.jpg",79,50,"1",0]

[22,"/graphics/gui_admin_login.jpg",283,120,"0",0]

[23,"/ag_logo.jpg",164,91,"1",0]

[24,"/images/head_logo.gif",312,68,"0",0]

[25,"/menu-images/logo.gif",169,50,"1",0]

[28,"/image/UI_Linksys.gif",288,58,"1",0]

[29,"/Images/Logo.gif",143,33,"0",0]

[30,"/images/logo.gif",169,50,"0",0]

[31,"/pic/logo.png",287,69,"0",0]

[32,"/spin.gif",16,16,"1",0]

[33,"/icons/top_left.png",300,96,"1",0]

[34,"/headlogo.gif",121,64,"0",0]

[35,"/pictures/home.jpg",255,41,"1",0]

[37,"/images/new_qanner.gif",840,92,"0",0]

[38,"/zyxellg.gif",169,50,"0",0]

[39,"/imagesV/vlogo_blk.jpg",185,40,"0",0]

[40,"/images/New_ui/asustitle.png",218,54,"0",0]

[41,"/images/New_ui/asustitle_changed.png",218,54,"0",0]

[45,"/images/date_bg.png",71,70,"0",0]

[47,"/graphic/head_04.gif",836,92,"0",0]

[49,"/image/logo.gif",390,69,"0",0]

[50,"/images/data_1_voda.gif",149,28,"0",0]

[51,"/images/logo_wind.gif",156,28,"0",0]

[53,"/pic/ag_logo.jpg",164,91,"0",0]

[54,"/banner_s.gif",126,65,"1",0]

[55,"/logo.gif",270,69,"0",0]

[56,"/logo_320x23.png",320,23,"0",0]

[58,"/image/UI_Linksys.gif",165,57,"1",0]

[59,"/file/int_logo_4_firmware.gif",366,66,"1",0]

[61,"/images/header.jpg",800,70,"0",0]

[62,"/images/btn_apply.png",61,20,"0",0]

[63,"/tendalogo.gif",387,90,"0",0]

[64,"/file/Logo.gif",216,83,"1",0]

[65,"/body/logo.jpg",154,118,"0",0]

[68,"/head_logo_p1_encore.jpg",92,72,"0",0]

[69,"/images/UI_Linksys.gif",288,57,"0",0]

[70,"/images/title_2.gif",321,28,"1",0]

[71,"/home_01.gif",765,95,"0",0]

[74,"/wlan_masthead.gif",836,85,"0",0]

[75,"/settingsDGND3300.jpg",799,97,"0",0]

[76,"/main/banner_files/bannertxt.gif",672,40,"0",0]

[77,"/html/images/dsl604.jpg",765,95,"1",0]

[79,"/head_logo.gif",140,64,"0",0]

[80,"/images/logo.jpg",270,69,"0",0]

[81,"/images/logo_netis.png",121,31,"0",0]

[82,"/images/icon-Change_pencil.png",18,18,"0",0]

[83,"/logo1.gif",207,105,"0",0]

[85,"/images/icon_now.gif",14,14,"0",0]

[87,"/down_02.jpg",135,75,"0",0]

[88,"/Images/logo.gif",270,69,"1",0]

[89,"/UILinksys.gif",166,58,"1",0]

[91,"/image/UI_Linksys.gif",134,58,"1",0]

[92,"/logo.gif",390,69,"0",0]

[93,"/images/icon_now.gif",14,14,"1",0]

[95,"/Images/img_masthead_red.gif",836,92,"0",0]

[97,"/images/topbg.gif",960,66,"0",0]

[99,"/down_02.jpg",133,75,"1",0]

[102,"/images2/main_title.n704bcm.gif",758,74,"0",0]

[104,"/common/images/logo.gif",108,32,"0",0]

[105,"/Images/logo.gif",780,62,"0",0]

[106,"/images2/login_title.n704bcm.gif",299,62,"0",0]

[107,"/images2/login_title.n704a3.gif",299,62,"0",0]

[108,"/file/logo.gif",165,47,"1",0]

[110,"/images/login_title_n104t.gif",299,62,"0",0]

[111,"/img/redbull.gif ",7,7,"1",0]

[112,"/images/head_logo.gif",140,78,"0",0]

[114,"/img/title_RP614v4.gif",750,85,"0",0]

[115,"/UI_Linksys.gif ",273,44,"1",0]

[116,"/logo.gif",318,69,"0",1]

[117,"/pic/img_masthead.gif",836,92,"0",0]

[118,"/images/logo.gif",76,69,"0",0]

[119,"/images/logo_transparent.gif",156,129,"0",0]

[121,"/Images/bg_a1.gif",280,70,"0",0]

[122,"/images/index_wrapper_bg_3347.png",801,325,"0",0]

[123,"/images/vz_logo.gif",185,40,"0",0]

[124,"/file/Manhattan_Banner.png ",452,90,"1",0]

[125,"/Images/Logo.gif",150,47,"0",0]

[126,"/Images/Logo.gif",200,50,"0",0]

[127,"/images/corp_logo.gif",153,42,"0",0]

[128,"/images/logo.png",171,75,"0",0]

[129,"/cornerartD241.jpg",140,90,"0",0]

 

原创文章,作者:奋斗,如若转载,请注明出处:https://blog.ytso.com/55272.html

(0)
上一篇 2021年8月7日
下一篇 2021年8月7日

相关推荐

发表回复

登录后才能评论