here in mexico we have been blogging about this issue for almost a year now (my self, the UNAM-CERT, et. al.)
just to correct some facts: the issue is not that the dsl router doesn't have a password. the issue is that because of a vulnerability in the 2wire router (this is the router that the biggest dsl provider in mexico deploys) has a "hole" the size of a "whole galaxy" that allows anyone to configure the router even if it is password protected.
this is a really nasty bug and one that is exposing a couple of hundred thousand if not millions of users in this country.
@Javier, thank you very much for the correction. MUCH better data.
This was seen as early as the 10th or 11th of this month.
The email that was used in this attack also had a malcode attached using some then current news in Mexico about some narco operator.
More information here:
I hope this helps!
old, no news here for me
Funny thing, yesterday I was following the note on "drive by pharming attacks in the wild" in google and found your blog, later, at home I started reading the new issue of IEEE's "Privacy & security" magazine and I found an article and somewhere in the text I read the name Jeremiah Grossman, so I recall to have read your blog a few hours ago.
BTW I was following the note because I work at the UNAM-CERT and we found the so-called "first drive-by-pharming in the wild" attack.
Post a Comment