/?pid=5522

Updated:06:50 PM EDT Nov 01


this is ggmania.com subsite New trojan in mass DNS hijack - TechAmok

New trojan in mass DNS hijack - [security]
05:53 AM EST - Dec,07 2008 - post a comment

A new variant on the 'DNSChanger' Trojan malware has been spotted in the wild. What makes this one interesting is how it can pollute other devices on a LAN, even fully-patched or non-Windows systems:
Researchers have identified a new trojan that can tamper with a wide array of devices on a local network, an exploit that sends them to impostor websites even if they are hardened machines that are fully patched or run non-Windows operating systems. The malware is a new variant of the DNSChanger, a trojan that has long been known to change the domain name system settings of PCs and Macs alike. According to researchers with anti-virus provider McAfee's Avert Labs, the update allows a single infected machine to pollute the DNS settings of potentially hundreds of other devices running on the same local area network by undermining its dynamic host configuration protocol, or DHCP, which dynamically allocates IP addresses. "Systems that are not infected with the malware can still have the payload of communicating with the rogue DNS servers delivered to them," McAfee's Craig Schmugar writes here of the new variant. "This is achieved without exploiting any security vulnerability."

The scenario plays out something like this:
-
Jill connects a PC infected by the new DNSChanger variant to a coffee shop's WiFi hotspot or her employer's local network.
- Steve connects to the same network using a fully-patched Linux box, which requests an IP address.
- Jill's PC injects a DHCP offer command to instruct Steve's computer to rout all DNS requests through a booby-trapped DNS server.
- Steve's Linux box can no longer be trusted to visit authoritative websites. Although the address bar on his browser may show he is accessing bank_of_america.com, he may in fact be at an impostor website.

The only way a user might know the attack is underway is by manually checking the DNS server his computer is using (e.g. by typing ipconfig /all at a Windows command prompt). There are several countermeasures users can take, Schmugar said, the easiest being hard-coding a DNS server in a machine's configuration settings. (In Windows, this can be done by going to Start > Control Panel > Network Connections and right clicking on Local Area Connection and choosing properties. Scroll down to Internet Protocol (TCP/IP) and click the Properties button. Then type in the primary and secondary for your DNS service. We're partial to OpenDNS, whose settings are 208.67.222.222 and 208.67.220.220.) In an interview, Schmugar said the DHCP attack doesn't exploit a vulnerability in either user machines or network hardware, allowing it to work with a wide variety of home and enterprise routers. It involves a ndisprot.sys driver that is installed on the infected box. Once there, it monitors network traffic for DHCP requests and responds with bogus offers that contain the IP address to the rogue DNS server.


Add your comment (free registrationrequired)

Short overview of recent news articles

Nov,01 2025 Battlefield REDSEC - Official Live-Action Trailer
Nov,01 2025 What's the Best PC Upgrade (besides CPU/GPU)?
Oct,31 2025 Directive 8020 - RTX On Trailer
Oct,30 2025 Stranger Things 5 - Official Trailer
Oct,29 2025 AMD Releases Software Adrenalin Edition 25.10.2 WHQL Drivers
Oct,29 2025 Exploding AMD CPUs | Investigating ASRock's Murderboards
Oct,29 2025 Setting Up Our First Huge Gaming Event was CHAOS
Oct,27 2025 Malware of the Future: What an infected system looks like in 2025
Oct,27 2025 F1: Race Highlights | 2025 Mexico City Grand Prix
Oct,26 2025 F1: Qualifying Highlights | 2025 Mexico City Grand Prix
Oct,25 2025 New Big Windows 11 25H2 October Update - New Taskbar Battery Icons
Oct,25 2025 Apple Prepping 'Transfer to Android' Feature, Including 3rd-Party
Oct,24 2025 HW News - RIP Internet, RAM Prices Skyrocket from AI Demand, Intel
Oct,21 2025 Retro Gaming PC Upgrades go WRONG!
Oct,21 2025 How social media has ruined us - the more time you spend online, the
Oct,20 2025 FERRARI 12 CILINDRI // 340KMH REVIEW on AUTOBAHN
Oct,20 2025 ROG Xbox Ally X - a PC Gamer's Perspective
Oct,20 2025 Race Highlights | 2025 United States Grand Prix
Oct,18 2025 RedMagic Puts Liquid Cooling in its New Gaming Phone
Oct,18 2025 Russia Says U.S. Is Planning a $37 Trillion Crypto Reset
Oct,18 2025 Tor Browser says no to Firefox's AI features as it removes them
Oct,14 2025 NVIDIA GeForce 581.57 WHQL Driver
Oct,13 2025 Samsung One UI 8.5 vs iOS 26 - COMPARISON
Oct,12 2025 Google Turned Down by Supreme Court, Must Open up App Payments
Oct,10 2025 AMD releases new 25.10.1 preview graphics driver with Battlefield 6
Oct,10 2025 MERCY Official Trailer (2026) Chris Pratt
Oct,07 2025 Galaxy S26 Ultra - Samsung, Please Don't Copy This
Oct,06 2025 Canada's Las Vegas Sphere is here - and I game on it
Oct,06 2025 Predator: Badlands - Official Final Trailer (2025)
Oct,04 2025 Chasing a Gaming World Record
Oct,02 2025 Frankenstein - Official Trailer (2025) Guillermo del Toro, Oscar
Oct,02 2025 iPhone 17 Pro Max vs 16 Pro Max / Pixel 10 Pro XL / Galaxy S25 Ultra
Sep,30 2025 iOS 26.0.1 is Out! - What's New?
Sep,30 2025 NEW! 2026 Audi Q3 2.0 TFSI (265hp) vs. e-hybrid (272hp)| 0-100 km/h
Sep,29 2025 Samsung One UI 8.5 Hands on - I Was Wrong
Sep,28 2025 iPhone Air Teardown - What is 3D Printed Titanium?
Sep,28 2025 Nvidia Wouldn't Send Me This $30,000 GPU - H200 Holy $H!T
Sep,27 2025 The Astronaut - Official Trailer (2025) Kate Mara, Laurence
Sep,25 2025 iPhone 17 Durability Test -- What Scratches are Permanent?
Sep,23 2025 iPhone 17 Pro Max vs. Galaxy S25 Ultra Drop Test!
>> News Archive <<

TechAmok - Privacy Policy        loading time:0.01secs