DNSChanger Router Exploit
The DNSChanger Exploit is distributed via malvertising and is unique because the malvertising component of the attack doesn’t target browsers but rather a victim’s router. This exploit is unrelated to the Netgear Router Exploit announced earlier. DNSChanger attacks begin with hackers buying and placing ads on mainstream websites. Those ads contain malicious code that can reveal a user’s local IP address. DNSChanger then uses Chrome to load multiple functions including malicious code contained in an image. The current goal of the exploit is to redirect browser/URL requests to additional or different ads, but could also redirect to further malicious code. Router firmware updates help to mitigate this exploit.
CourseVector helps keep your website safe and current through our Managed WordPress Hosting service.