Fraudsters redirect users` bank-related queries to phishing webpages and steal their banking login data by exploiting vulnerabilities in home routers, according to security researchers of Poland`s Computer Emergency Response Team (CERT Polska).
Hackers use the software bugs to remotely modify the router DNS setting. Every time users from inside the network attempt to connect to an online banking service, they land on a fake banking page.
Scammers steal users` log-in data the moment they type their username, passwords and TANs (transaction authentication numbers) into the counterfeited login forms, which then forward the data to the legitimate bank, but, most likely, modify the recipient`s account and amount of money. The transaction is then validated with the MTAN entered by the user. All this time, the entire transaction is forged. The result is unauthorized withdrawal from the victims` accounts.
Apparently, the attack only works with banking transactions originating from browsers, and not dedicated e-banking applications, because the latter would check the SSL certificate and fail.
This attack works no matter the device used to connect to the online banking accounts. The redirect is done at router level.
“The attack is possible due to several vulnerabilities in home routers that make DNS configuration susceptible to unauthorized remote modifications. The effects propagate to all users in local networks, regardless of hardware and system platform (provided they acquire DNS configuration from the router),” CERT Polska writes on its website.
How to prevent such attacks?
tags
A blend of product manager and journalist with a pinch of e-threat analysis, Loredana writes mostly about malware and spam. She believes that most errors happen between the keyboard and the chair.
View all postsNovember 14, 2024
September 06, 2024