|06 Mar 2014||#1|
| || |
Attack campaign compromises 300,000 home routers, alters DNS settings
In January, Team Cymru’s researchers identified two TP-Link wireless routers whose settings were altered to send DNS (Domain Name System) requests to two particular IP addresses: 184.108.40.206 and 220.127.116.11. An analysis of the rogue DNS servers running at those IP addresses revealed a mass-scale compromise of consumer networking devices.
Over a one-week period, more than 300,000 unique IP addresses sent DNS requests to the two servers, the Team Cymru researchers said in a report released Monday. Many of those IP addresses corresponded to a range of routers, including models from D-Link, Micronet, Tenda, TP-Link and other manufacturers, that had their DNS settings maliciously altered, they said.
|My System Specs|
|Similar help and support threads for2: Attack campaign compromises 300,000 home routers, alters DNS settings|
|Default settings leave external hard drives connected to Asus routers||Security News|
|Yahoo Voice Hack Attack Compromises 453,000 Passwords||Security News|
|ICSA Labs to certify broadband home routers||Security News|
|Millions of routers vulnerable to hack attack - Is yours?||System Security|
|DNS Rebinding Attack Can Be Used to Hack Home Routers||News|
|Our Sites ||Site Links ||About Us ||Find Us |
© Designer Media Ltd
All times are GMT -5. The time now is 01:33 AM.