

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.Avast Business is a cloud-based security software for endpoint devices and servers and is primarily targeted at industry users rather than individuals. Hijacking the DNS settings through CSRF attacks is a common form used by the attackers to send phishing websites rather than the real sites to the users to steal sensitive information and login credentials. Sender email:, Destination email: List of affected routers The attackers receive the stolen users’ information through email from the phishing server, and the security experts at Avast has found two different configurations of the email addresses that were used to send the emails with stolen data to the attacker.

The primary goal of the attackers is to collect users’ data like the login credentials to online banking sites, and credit card numbers with all these phishing web pages.

Here, all these web pages indicate that the attackers are mainly focused on the biggest banks in Brazil, on Netflix, travel companies, etc.:. Not only that, even for each prefix, 65,536 addresses were scanned in the given range in increasing order.Īfter the attacker picked the prefix, some versions of the exploit set printed the name GhostDNS, ‘with an error – GostDNS instead of GhostDNS’, in order to inform operators about cross-site request forgery (CSRF) execution.Īpart from this, the security researchers have also published the top targeted countries as well, and here they are:-Īlong with the GhostDNS source code, the security researchers also found several phishing sites and some phishing web pages that were not yet implemented as well.

Moreover, the security researchers have found a list of IP address prefixes in 69 countries, and most often in South America. The Router EK attacks from the local network, and it requires the user to click on a malicious link, while the BRUT is a scanner for finding the routers that are accessible through the internet and attacking them without user intervention.
