Tag Archive for: Hijacking

An HTTPS hijacking click-fraud botnet infects almost 1 million computers – InfoWorld

An HTTPS hijacking click-fraud botnet infects almost 1 million computers
InfoWorld
Over the past two years, a group of cybercriminals has infected almost 1 million computers with malware that hijacks search results, even when they're served over encrypted HTTPS connections. ultimate guide promo smb · The ultimate guide to small …

and more »

“HTTPS hijacking” – read more

An HTTPS hijacking click-fraud botnet now infects almost 1M computers – Computerworld

An HTTPS hijacking click-fraud botnet now infects almost 1M computers
Computerworld
Over the past two years, a group of cybercriminals has infected almost 1 million computers with malware that hijacks search results, even when they're served over encrypted HTTPS connections. The click-fraud botnet earns its creators money through …

and more »

“HTTPS hijacking” – read more

An HTTPS hijacking click-fraud botnet infects almost 1 million computers – PCWorld


PCWorld

An HTTPS hijacking click-fraud botnet infects almost 1 million computers
PCWorld
Over the past two years, a group of cybercriminals has infected almost 1 million computers with malware that hijacks search results, even when they're served over encrypted HTTPS connections. The click-fraud botnet earns its creators money through …

and more »

“HTTPS hijacking” – read more

Attackers are hijacking critical networking gear from Cisco, company warns

Cisco Systems officials are warning customers of a series of attacks that completely hijack critical networking gear by swapping out the valid ROMMON firmware image with one that’s been maliciously altered.

The attackers use valid administrator credentials, an indication the attacks are being carried out either by insiders or people who have otherwise managed to get hold of the highly sensitive passwords required to update and make changes to the Cisco hardware. Short for ROM Monitor, ROMMON is the means for booting Cisco’s IOS operating system. Administrators use it to perform a variety of configuration tasks, including recovering lost passwords, downloading software, or in some cases running the router itself. In an advisory published Wednesday company officials wrote:

In all cases seen by Cisco, attackers accessed the devices using valid administrative credentials and then used the ROMMON field upgrade process to install a malicious ROMMON. Once the malicious ROMMON was installed and the IOS device was rebooted, the attacker was able to manipulate device behavior. Utilizing a malicious ROMMON provides attackers an additional advantage because infection will persist through a reboot.

No product vulnerability is leveraged in this attack, and the attacker requires valid administrative credentials or physical access to the system to be successful. The ability to install an upgraded ROMMON image on IOS devices is a standard, documented feature that administrators use to manage their networks. No CVE ID will be assigned.

The significance of the advisory isn’t that the initial firmware can be replaced. As indicated, that’s a standard feature not only with Cisco gear but just about any computing device. What’s important is that attackers are somehow managing to obtain the administrative credentials required to make unauthorized changes that take control of the networking gear. The advisory doesn’t say how the attackers are obtaining the credentials.

Read on Ars Technica | Comments


Ars Technica » Technology Lab