Popular consumer routers have been reported with numerous active DNS hijacking exploits. According to Troy Mursch of Bad Packets LLC who analyzed the DNS hijacking campaign, it started with exploits made on certain D-Link modems, at the end of December last year. It was also observed that the attackers relied on Google Cloud Platform (GCP) hosts for all the latest exploits.
The three waves of the campaign
Abusing GCP
Mursch emphasized that the cloud service provider’s vastness made it attractive for baddies to easily conduct DNS hijacking.
“Anyone with a Google account can access a 'Google Cloud Shell' machine by simply visiting this URL (refers to the Cloud Shell’s link). This service provides users with the equivalent of a Linux VPS with root privileges directly in a web browser. Due to the ephemeral nature of these virtual machines coupled with Google’s slow response time to abuse reports, it’s difficult to prevent this kind of malicious behavior,” the security researcher wrote.
Overall, it was found that around 17,000 routers were vulnerable to the DNS hijacking campaign. Users are advised to always keep their routers’ firmware to stay away from such dangerous attacks.
Publisher