Security News Cybercriminals target Brazilian routers with default credentials

Captain Awesome

Level 24
Thread author
Verified
Top Poster
Well-known
May 7, 2016
1,307
Households and small businesses that use consumer-grade internet routers may fall victim to attacks that are presently targeting mainly Brazilian users, but may be easily localized to any other country.

These attacks have been around since 2012, but the risks they carry are rising sharply as the number of devices connected via routers to the internet skyrockets (according to Cisco there will be 3.4 devices connected to IP networks per capita by 2020). Therefore, we are closely monitoring these attacks in order to keep pace with recent developments in the attackers’ techniques.

It seems likely that there are different groups conducting these attacks as both the methodology and the scripts used vary. The basics, however, remain the same: they leverage either open access to routers due to weak authentication (mostly default username/password combination) or vulnerabilities in their firmware.

The main objectives of these attacks are to change the DNS configuration, allow remote management access with public IP and to set a predefined (many times the default) password for potential easy access for the perpetrators at a later time.

How the attacks work
The attacks we’ve observed were the result of redirection from a malicious page or advertising network to the perpetrators’ landing page hosting a malicious script.

The script then tries predefined username:password combinations at default local addresses for particular router types along with the desired commands to execute.

The affected users are mostly running Firefox, Chrome or Opera browsers. Internet Explorer seems to be safe mainly due to the fact that it does not support the username:password@server notation (https://support.microsoft.com/en-us/kb/834489).

Read More:Cybercriminals target Brazilian routers with default credentials
 

viktik

Level 25
Verified
Well-known
Sep 17, 2013
1,492
the router companies should have installed a randomly generated password in the router, which would be printed on the router.
That simple measure should have averted all these problems.
 
Last edited:
  • Like
Reactions: Balrog

Solarquest

Moderator
Verified
Staff Member
Malware Hunter
Well-known
Jul 22, 2014
2,525
Today there are many news about that.

But : so these attacks are successful ONLY if you left the default pw? ( how many people still use the default pw ? )


Anyway: what sw protects DNS? Thank you

Default passwords are the 1st and main problem.
Old, buggy router firmware the 2nd.
Until manufacturers keep selling and also not updating (many timea so badly) unsafe devices we are at risk...we need public controls and big fines!
I really hope we get these controls and fines before a huge wave of infections ...routers, IOT, smartphones are at risk.
 
  • Like
Reactions: Dirk41

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top