Stefan Tanase, principal security researcher at Ixia, told Ars that the DNS servers described in this article were taken down and that the attackers have replaced them with new DNS servers. Ixia analyzed the rogue DNS server and found it targets the following domains: GMail.com, PayPal.com, Netflix.com, Uber.com, caix.gov.br, itau.com.br, bb.com.br, bancobrasil.com.br, sandander.com.br, pagseguro.uol.com.br, sandandernet.com.br, cetelem.com.br, and possibly other sites. People trying to reach one of these domains from an infected router will be connected to a server that serves phishing pages over plain HTTP.

Below is how cetelem.com.br appeared in Firefox on a machine configured to use one of the malicious DNS servers.

On Friday afternoon, a Google representative emailed the following statement:

We have suspended the fraudulent accounts in question and are working through established protocols to identify any new ones that emerge. We have processes in place to detect and remove accounts that violate our terms of service and acceptable use policy, and we take action on accounts when we detect abuse, including suspending the accounts in question. These incidents highlight the importance of practicing good security hygiene, including patching router firmware once a fix becomes available.

What follows is this article as it appeared on Thursday, 4/4/2019, 2:59 PM:

A wave of DNS hijacking attacks that abuse Google's cloud computing service is causing consumer routers to connect to fraudulent and potentially malicious websites and addresses, a security researcher has warned.

By now, most people know that Domain Name System servers translate human-friendly domain names into the numeric IP addresses that computers need to find other computers on the Internet. Over the past four months, a blog post published Thursday said, attackers have been using Google cloud service to scan the Internet for routers that are vulnerable to remote exploits. When they find susceptible routers, the attackers then use the Google platform to send malicious code that configures the routers to use malicious DNS servers.

Troy Mursch, the independent security researcher who published Thursday's post, said the first wave hit in late December. The campaign exploited vulnerabilities in four models of D-Link routers, including:

The exploits gave attackers control over routers that hadn't been patched. The attackers would then use their control to reconfigure the routers to use a DNS server at 66.70.173.48, an IP address provided by host OVH.

A second wave in early February targeted the same vulnerable D-Link routers, only this time it caused them to use a rogue DNS server at 144.217.191.145, a different OVH IP address. According to Twitter user parseword, most of the DNS requests were then redirected to two IPs, one allocated to a crime-friendly hosting provider (AS206349) and the other pointing to a service that monetizes parked domain names (AS395082).

The third and last-known wave occurred last week. It came from three distinct Google Cloud Platform hosts and targeted additional consumer router models including the ARG-W4 ADSL, DSLink 260E, and those from Secutech and TOTOLINK. The rogue DNS servers used in the latest round, 195.128.126.165 and 195.128.124.131, are both hosted in Russia by Inoventica Services, with Internet access being provided by subsidiary Garant-Park-Internet Limited (AS47196).

At the time this post was being written, the last batch of rogue DNS servers was still operating, Mursch told Ars. The DNS servers from the previous waves, he added, were no longer operating. While the attacks abused services from a variety of providers, Mursch said Google's cloud service stood out.

"It's not meant to be a Google hit piece," the researcher said of Thursday's post. "But it's so trivial to abuse their platform. You sign up for an account and boom. It really is that easy." He said Google will eventually terminate service once the company receives reports of the abuse, but it often takes time and effort before that happens. Ars asked Google representatives for comment and will update this post if they respond.

Mursch said he hasn't yet investigated precisely what domains are spoofed in the attacks. One of the best-known DNS hijacking campaigns came to light in 2012 under the name DNS Changer and generated millions of dollars in fake advertising revenue by steering 500,000 computers to fake addresses . Rogue DNS server schemes have also been used to surreptitiously serve malicious ads and direct people to fake banking sites

The best way for people to protect themselves against these sorts of attacks is to ensure their routers are running the latest firmware. All four of the D-Link vulnerabilities under attack were fixed years ago, but many people never go through the hassle of manually installing the patches. It's also a good idea to periodically inspect router configurations to make sure DNS settings are OK. Cloudflare's free DNS service 1.1.1.1 is a good bet. It's never a bad idea to also configure the operating system of each device to use a DNS server such as 1.1.1.1, but Mursch warned that sometimes malicious changes made to hacked routers can override those OS configurations.