• Total Posts: 28035
  • Total Topics: 8051
  • Online Today: 772
  • Online Ever: 51419
  • (01. January 2010., 09:27:49)

Author Topic: Sality malware attacks on 14 router models from TP-Link, D-Link, ZTE & Huawei  (Read 528 times)

0 Members and 1 Guest are viewing this topic.


  • SCF Administrator
  • *****
  • Posts: 7151
  • KARMA: 291
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • - Samker's Computer Forum

A botnet that was slowly shrinking has taken on a new trick: brute-forcing routers set to easy-to-guess credentials.

The malware behind the botnet, called Sality, has been around since 2003, in part due to its use of digitally-signed communications and an efficient software design, wrote Benjamin Vanheuverzwijn, a malware researcher with Eset:

Sality is a general piece of malware that can download other components and has been used over the years for misdeeds such as faking advertising network traffic, distributed denial-of-service attacks and cracking VoIP accounts.

But the number of computers infected by Sality appears to have been decreasing slightly over the last couple of years, perhaps due to difficulties in infecting new machines, Vanheuverzwijn wrote on a blog post on Wednesday.

To up its numbers, the latest version of Sality has a component called Win32/RBrute.A that scans the Internet for router control panels and attempts to log into them using a short list of user names and passwords.

“The usual infection vectors of W32/Sality might not be sufficient enough to keep the botnet alive; hence the botnet controllers are deploying new components to grow the botnet,” Vanheuverzwijn wrote.

It is targeting 14 router models from TP-Link, three from D-Link, two made by ZTE and one from Huawei. If it successfully logs into a router, it changes the default DNS (Domain Name System) server, which is responsible for translating domain names into IP addresses that can be displayed in a browser.

The powerful attack has long been a favorite of attackers. By redirecting a victim to their own malicious DNS server, the attackers can control where a person is directed to even if they type in the correct domain name for a website.

In Sality’s case, it redirects people to a fake Google Chrome browser download page if a person tries to go to Facebook or Google. It then hopes the users will download what purports to be Chrome but is actually Sality.

If Sality is downloaded, the malware then corrects the DNS change to “,” the IP address for Google’s free Public DNS service, Vanheuverzwijn wrote.

“Since infected PCs will no longer be using the router’s DNS server, they will no longer be affected by its bogus redirections,” he wrote.

The number of computers infected with Sality appeared to rise around December 2013, which coincided when the DNS component was added. But it’s questionable how effective the new tactic may be in the long term, as many router configuration portals are not configured to be Internet facing, Vanheuverzwijn wrote.

Another weakness is that Sality tries only about 10 sets of simple credentials. But it is possible that Sality could reach a lot of users if it hits a vulnerable public access point used by many people, Vanheuverzwijn wrote.

“A good security practice that would reduce the scope of the problem is to change the default password on a router’s web interface,” he wrote.


Samker's Computer Forum -


With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters)

Enter your email address to receive daily email with ' - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising