Remote workers vulnerable to pharming, Symantec warns

Drive-by pharming route users to fake websites as hackers attack wireless routers.

Researchers at the Indiana University School of Informatics and security company Symantec have uncovered a method of hijacking web browsers.

The attack involves little more on the victim's part than simply visiting a web page.

The attacker's web page runs a piece of JavaScript code which attempts to log in to your router in the background and reconfigures the settings, including the DNS servers.

At the next attempt to visit a website on the internet, the router will check a different DNS server - one owned by the attacker - and get pages from wherever that DNS server tells it to.

In the case of online banking, the victim would type in the web address of their bank but might be directed to another site that looks exactly like the genuine article, including the address bar. (This technique is known as pharming, as opposed to the social-engineering techniques of phishing, where the user is duped more directly.)

"Such an attack is potentially quite devastating," claimed Symantec. "I believe this attack has serious widespread implications and affects many millions of users worldwide."

Even though the victim has to first visit the site and the JavaScript code needs to successfully get the login credentials to the router, the scope of the attack is huge.

Around 90 per cent of internet users enable JavaScript to run on their browser, while around half fail to change the default usernames and passwords with which their routers are shipped.

Lists of the various default username and password combinations for different makes of routers are widely available. Routerpasswords has an easy to use tool for finding them. Phenoelit.de publishes a list for the use of "computer security consultants interested in testing the security configuration of equipment," while CyberPunkCafe boasts the "Worlds Largest Default Router Password List!!".

Stopping such an attack is equally trivial, but it does involve a change in behaviour from the 50 per cent of lazy Internet users. "The simplest thing you can do to protect yourself is change the default password on your home wireless router," said Symantec. "Also, in general, I'd recommend staying away from Web sites that aren't known to be at least reasonably trustworthy. (And definitely don't blindly click on links in emails - even if the link came from someone you know. Remember, simply clicking on a link is all it takes for this attack to do its damage.)"

An animation of how the attack works is available from Symantec here.

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Leading the data race

The trends driving the future of data science

Download now

How to create 1:1 customer experiences at scale

Meet the technology capable of delivering the personalisation your customers crave

Download now

How to achieve daily SAP releases

Accelerate the pace of SAP change to support your digital strategy

Download now

Recommended

Your essential guide to internet security
Security

Your essential guide to internet security

23 Sep 2020
How to enable private browsing on any device
privacy

How to enable private browsing on any device

22 Sep 2020
Third-party apps are tracking your WhatsApp activity
social media

Third-party apps are tracking your WhatsApp activity

21 Sep 2020
Ransomwiz lets you test your security with simulated ransomware
ransomware

Ransomwiz lets you test your security with simulated ransomware

21 Sep 2020

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
Windows Server flaw sparks emergency US gov warning
vulnerability

Windows Server flaw sparks emergency US gov warning

21 Sep 2020