Attackers implanted iFrames into the website of Politica Estadao, which when loaded began brute force password guessing attacks against users.
"[The] script is being used to identify the local IP address of your computer. It then starts guessing the router IP by passing it as a variable to another script," he " Souza adds.
"iFrames were trying to change the DNS configuration on the victim’s DSL router by brute forcing the admin credentials".
The attack code was manipulated to target Internet Explorer that targeted possible IP addresses on a readers' local network range including '192.168.0.1' and '192.167.1.1'.
Content was loaded from the likely compromised website laspeores.com.ar and two others using iFrames that contained malicious JavaScript code.
"This is but one example of a wide range of actions available to the crackers," Souza said. Websites have been the number one distribution mechanism for malware for a while, and now we're seeing this evolution in attacks. It's unlikely that this will end soon"
The attack could be most easily foiled if users changed the administrative credentials on their routers which left usernames and passwords often set both to admin.
Concerned users should disable JavaScript and play options for browser objects, and consider running script blockers such as NoScript or Not Script.
Hey Thanks for sharing this blog its very helpful to implement in our work
ReplyDeleteRegards
find a hacker