> Date: Tue, 12 Nov 2013 06:35:51 +0000
> From: "Dobbins, Roland" <rdobb...@arbor.net>
> To: NANOG list <nanog@nanog.org>
> Subject: Re: CPE  dns hijacking malware
>
>
> On Nov 12, 2013, at 1:17 PM, Jeff Kell <jeff-k...@utc.edu> wrote:
>
> > (2) DHCP hijacking daemon installed on the client, supplying the hijacker's 
> > DNS servers on a DHCP renewal.  Have seen both, the latter being more
> > common, and the latter will expand across the entire home subnet in time 
> > (based on your lease interval)
>
> I'd (perhaps wrongly) assumed that this probably wasn't the case, as the OP 
> referred to the CPE devices themselves as being malconfigured; it would be 
> helpful to know if the OP can supply more information, and whether or not 
> he'd a chance to examine the affected CPE/end-customer setups.
>

I have encountered a family members provider supplied CPE that had the
web server exposed on the public interface with default credentials still
in place. It's probably more common than one would expect.

-- 
Matthew Galgoci
Network Operations
Red Hat, Inc
919.754.3700 x44155
------------------------------
"It's not whether you get knocked down, it's whether you get up." - Vince 
Lombardi

Reply via email to