sfx2000
Part of the Furniture
(another reason to check up on firmware... this one is another iteration of a DNS changer exploit)
https://www.proofpoint.com/us/threa...r-attack-malvertising-windows-android-devices
https://www.proofpoint.com/us/threa...r-attack-malvertising-windows-android-devices
Proofpoint researchers have reported frequently this year on the decline in exploit kit (EK) activity. EKs, though, are still vital components of malvertising operations, exposing large numbers of users to malware via malicious ads. Since the end of October, we have seen an improved version of the “DNSChanger EK” [1] used in ongoing malvertising campaigns. DNSChanger attacks internet routers via potential victims’ web browsers; the EK does not rely on browser or device vulnerabilities but rather vulnerabilities in the victims' home or small office (SOHO) routers. Most often, DNSChanger works through the Chrome browser on Windows desktops and Android devices. However, once routers are compromised, all users connecting to the router, regardless of their operating system or browser, are vulnerable to attack and further malvertising.