Peaches Posted March 17, 2009 Report Share Posted March 17, 2009 New DNS trojan taints entire LAN from single box One 'sploit pwns all By Dan Goodin in San Francisco 16th March 2009 22:43 GMT Internet security experts are warning of a new rash of malware attacks that can hijack the security settings of a wide variety of devices on a local area network, even when they are hardened or don't run on Windows operating systems. Once activated, the trojan sets up a rogue DHCP, or dynamic host configuration protocol, server on the host machine. From there, other devices using the same LAN are tricked into using a malicious domain name system server, instead of the one set up by the network administrator. The rogue DNS server sends the devices to fraudulent websites that in many cases can be hard to identify as impostors. RegAd('mpu1', 'reg.security.4159/front', 'pos=top;sz=336x280', VCs); A new variant of Trojan.Flush.M is making the rounds, Johannes Ullrich, CTO of the SANS Internet Storm Center warns here. It offers several improvements over its predecessor, which was discovered in early December. Among other changes, the new strain no l The Register for full article - http://www.theregister.co.uk/2009/03/16/dn...jacking_trojan/ Quote Link to post Share on other sites
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.