Security News > 2015 > May > Exploit Kit Using CSRF to Redirect SOHO Router DNS Settings (Threatpost)
2015-05-26 15:05
French researcher Kafeine has found an exploit kit delivering cross-site request forgery attacks that focus on SOHO routers and changing DNS settings to redirect to malicious sites.
News URL
http://threatpost.com/exploit-kit-using-csrf-to-redirect-soho-router-dns-settings/112993
Related news
- New botnet exploits vulnerabilities in NVRs, TP-Link routers (source)
- 15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials (source)
- Malware botnets exploit outdated D-Link routers in recent attacks (source)
- Hackers exploit Four-Faith router flaw to open reverse shells (source)
- New Mirai botnet targets industrial routers with zero-day exploits (source)
- Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks (source)
- Hackers exploit KerioControl firewall flaw to steal admin CSRF tokens (source)
- Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers (source)
- Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet (source)