Security News > 2018 > October > GhostDNS: New DNS Changer Botnet Hijacked Over 100,000 Routers
2018-10-01 13:03
Chinese cybersecurity researchers have uncovered a widespread, ongoing malware campaign that has already hijacked over 100,000 home routers and modified their DNS settings to hack users with malicious web pages—especially if they visit banking sites—and steal their login credentials. Dubbed GhostDNS, the campaign has many similarities with the infamous DNSChanger malware that works by
News URL
http://feedproxy.google.com/~r/TheHackersNews/~3/eRvRty7thdo/ghostdns-botnet-router-hacking.html
Related news
- 13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks (source)
- Juniper warns of Mirai botnet targeting Session Smart routers (source)
- Juniper warns of Mirai botnet scanning for Session Smart routers (source)
- New botnet exploits vulnerabilities in NVRs, TP-Link routers (source)
- Malware botnets exploit outdated D-Link routers in recent attacks (source)
- New Mirai botnet targets industrial routers with zero-day exploits (source)
- Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks (source)
- MikroTik botnet uses misconfigured SPF DNS records to spread malware (source)
- Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet (source)