Serious Home Network Threat
Identity Theft . Self-DefenseFlash attack could take over your home router. Security researchers have released code showing how a pair of widely used technologies could be misused to take control of a victim’s Web browsing experience. The code, published last week by two researchers, exploits features in two technologies: The Universal Plug and Play (UPnP) protocol, which is used by many operating systems to make it easier for them to work with devices on a network; and Adobe Systems’ Flash multimedia software. By tricking a victim into viewing a malicious Flash file, an attacker could use UPnP to change the primary DNS (Domain Name System) server used by the router to find other computers on the Internet. This would give the attacker a virtually undetectable way to redirect the victim to fake Web sites. For example, a victim with a compromised router could be taken to the attacker’s Web server, even if he typed Citibank.com directly into the Web browser navigation bar. “The most malicious of all malicious things is to change the primary DNS server,” the researchers wrote. “That will effectively turn the router and the network it controls into a zombie which the attacker can take advantage of whenever they feel like it.” Because so many routers support UPnP, the researchers believe that “ninety nine percent of home routers are vulnerable to this attack.” In fact, many other types of UPnP devices, such as printers, digital entertainment systems and cameras are also potentially at risk, they added in a Frequently Asked Questions Web page explaining their research. The attack is particularly worrisome because it is cross-platform — any operating system that supports Flash is susceptible — and because it is based on features of UPnP and Flash, not bugs that could be easily fixed by Adobe or the router vendors. Source: http://www.networkworld.com
What this means is that if you are surfing the Internet and are being redirected to fake sites OR if the site looks correct but the URL appears odd you may want to check the Primary DNS setting on your router. This is a really sneaky attack that most people probably won’t detect. As usual be careful out there!!
3 comments
Leave a ReplyCancel reply
This site uses Akismet to reduce spam. Learn how your comment data is processed.
M | T | W | T | F | S | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | ||||
4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 | 16 | 17 |
18 | 19 | 20 | 21 | 22 | 23 | 24 |
25 | 26 | 27 | 28 | 29 | 30 |
Awareness (51) Beliefs (22) Celebrity (38) Christmas (10) Confidence (13) critical thought (18) Diet (17) Entertainment (28) Exercise (16) Failure (13) Fitness (46) Freedom (21) Fun (50) Funny (41) Gun Control (16) Guns (20) Health (26) History (31) Holiday (49) Jokes (12) Karate (38) Kyokushin (28) Liberty (18) Mas Oyama (27) Meditation (21) News (65) Patriotic (17) Perspective (80) Politics (18) Questions (13) Quotes (39) Recruitment (13) Religion (24) Self-Control (10) Self-Defense (48) Site News (10) Sparring (19) State of Mind (29) Style (17) Success (18) Technique (28) Training (110) Video (49) Weapons (13) Zen (26)
..WOW Hi again,
Its a shame this thread has not progressed further with comments.
Anyhow I enjoyed reading your post as it is relevant to today! Ill check back soon for any added comments, thanks.
Its an interesting topic and should be discussed.
———————–
http://www.martialarm.info
martial arts news and information
Thanks Tim!
Can always count on you to be up to date on current technology issues. Just added those extensions to my firefox browser.
If you aren’t running Firefox you should be!
There are some great Firefox extensions to protect yourself. Here are two of my favorite that are always running.
Flashblock: https://addons.mozilla.org/en-US/firefox/addon/433
NoScript: https://addons.mozilla.org/en-US/firefox/addon/722
Happy SAFE browsing !!!