Win32/RBrute.A
Win32/RBrute.A is a Trojan that is a component of Sality used to hijack the DNS addresses of routers. Win32/RBrute.A scans the Web for numerous router models. The list involves Cisco, D-Link, Huawei, TP-Link and ZTE routers. Most targeted models of Win32/RBrute.A are from TP-Link. When one of these routers is identified, Win32/RBrute.A downloads a list of IP addresses from the command and control (C&C) server and attempts to execute a brute-force attack on the device's administration panel. The C&C server sends the bot a list of around a couple of dozen common or default passwords to attempt and access the administration page. The list involves 'qwerty,' 'password,' 'trustno1,' 'root,' 'admin,' '123456,' '12345,' 'administrator' and 'abc123'. Once access is obtained, the router's primary DNS server address is changed. By changing the server's address, cybercrooks can reroute computer users to arbitrary websites. PC users whose computers are affected will be rerouted to a fake Google Chrome installation website whenever web addresses including the words 'google' or 'facebook' are requested.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.