Cybercriminals compromise home routers to attack online banking users
- 07 February, 2014 19:01
Attackers configure rogue DNS servers on compromised home routers to intercept online banking traffic
Attacks recently observed in Poland involved cybercriminals hacking into home routers and changing their DNS settings so they can intercept user connections to online banking sites.
Researchers from the Polish Computer Emergency Response Team (CERT Polska) believe attackers will likely target users from other countries as well in the future using similar techniques.
Unless intentionally configured otherwise, devices connected to a local network will typically use the DNS server provided by the network's router to resolve domain names to IP (Internet Protocol) addresses. If attackers compromise the router and configure it to use a DNS server under their control, they can respond with rogue IP addresses to DNS queries for the domain names they wish to target.
In the recent attacks in Poland, the hackers used a DNS server that responded with rogue IP addresses for the domain names of five Polish banks. Those IP addresses corresponded to a server that acted as a proxy, providing attackers with a man-in-the-middle position to intercept, inspect and modify traffic between users and the online banking websites they wanted to target.
The problem for the hackers was that those sites used HTTPS -- HTTP with SSL encryption -- making it impossible to impersonate them without a valid digital certificate issued by a certificate authority. Because of this, they decided to use a less sophisticated technique known as SSL stripping.
Many banks use SSL encryption for their online banking systems, but not their entire websites. In most cases, users first connect to the bank's main website over plain HTTP and then click on a button or link to access the log-in page for the secure part of the site where SSL is enabled.
It is at this point that attackers prevented the secure connection from being established. Their rogue proxy server established an encrypted connection with the online banking site, but kept the connection between the user and itself unencrypted.
When such an attack is in progress, the visual indicators for secure SSL connections are missing from the browser. However, it's hard for the victims to notice since they clicked on a URL from the bank's real website so they have no reason to suspect an attack, said Przemyslaw Jaroszewski, the head of incident response at CERT Polska.
The attackers went even further and rewrote the URLs seen by users in their browser's address bar to have "ssl-." in front of the domain name.
While none of the individual techniques used in the attacks were new, Jaroszewski said that as far as he knows this is the first time when attackers used them together in a mass attack targeting online banking users.
Polish IT security outfit Niebezpiecznik.pl linked the attacks to a vulnerability reported last month in ZyNOS, a router firmware created by ZyXEL Communications that's apparently also used in some router models from other manufacturers including TP-Link, ZTE, D-Link and AirLive.
The vulnerability allows attackers to download a file containing the router's configuration without authentication. The file can then be unpacked and parsed to extract the password for the router's administrative interface.
CERT Polska couldn't definitively link a particular vulnerability to the DNS attacks, Jaroszewski said. While the ZyNOS vulnerability looks like a strong candidate, some of the attacks date back to late December, before the vulnerability was publicly disclosed, he said.
"There are many ways to modify DNS entries in home routers, some of them known for years," Jaroszewski said. "It is actually surprising that it's the first time we see it exploited for profit on a mass scale."
Many vulnerabilities that allowed remote access to the administration interface of home routers were found over the years, including in models supplied by various ISPs to their customers.
Three vulnerabilities were found last month in a router called EE BrightBox that's provided by British broadband provider EE to customers as standard equipment. One of those vulnerabilities could potentially allow attackers to change the router's DNS configuration.
Jaroszewski believes that it's likely DNS attacks like those in Poland will be used against online banking users in other countries in the future. However, for now he wasn't aware of any reports of similar attacks outside Poland.
"In order to protect a home routers from the attack, any type of remote administration access from the Internet should be disabled," the Polish CERT researchers said. "Default usernames and passwords should be changed to unique ones, not revealed publicly."