“Internet security experts are warning of a new rash of malware attacks that can hijack the security settings of a wide variety of devices on a local area network, even when they are hardened or don’t run on Windows operating systems.Once activated, the trojan sets up a rogue DHCP, or dynamic host configuration protocol, server on the host machine. From there, other devices using the same LAN are tricked into using a malicious domain name system server, instead of the one set up by the network administrator. The rogue DNS server sends the devices to fraudulent websites that in many cases can be hard to identify as impostors.”
Here is some more Tech News from around the web:
- Cisco Barges Into the Server Market @ Slashdot
- Form Meets Function: Decorative Technology @ Digital Trends
- Coverage from Live MST3K Show in Seattle @ OCModShop
- Kodak Zi6 Pocket Camera Review @ Rbmods
Attacking the weakest link
If you haven’t already memorized your DNS server, you might want to make it a goal, or at least write it down. There is a new nasty out there called Trojan.Flush.M, which can be dangerous to anything connected to a network. It only needs one vulnerable machine on a LAN or WAN, which it infects and sets up a rouge DNS server which then starts sending you off on phishing trips
whenever you try to browse. For right now, if it is practical, you may want to enter your DNS manually, which will prevent you from being misdirected by an infected LAN, and you can also blacklist 64.86.133.51 and 63.243.173.162 which are the two most current addresses being seen on infected networks. Hit The Register for more information.