Last year we wrote about Fareit being massively spammed.
A couple of months later, they added another means of infecting systems - via malicious DNS servers.
When the DNS server settings has been changed to point to a malicious server used by Fareit, the unsuspecting user visiting common websites gets an alert saying "WARNING! Your Flash Player may be out of date. Please update to continue".
A "Flash Player Pro" download page will be shown pretending to be served from the website that the user is trying to visit.
Downloading the "setup.exe" file does not really pull any binary from Google. Instead, the user will end up with a copy of Fareit from a malicious IP. Fareit is an information stealer and downloader.
The recent samples that we've encountered connect and download from: • angryflo.ru • reggpower.su • 188.8.131.52
Fareit infections via malicious DNS servers that we have seen were mostly from Poland.
From the beginning of the year, we've observed that users were redirected to these IPs: • 184.108.40.206 • 220.127.116.11 • 18.104.22.168 • 22.214.171.124 • 126.96.36.199
While here are some of the reported malicious DNS servers: • 188.8.131.52 • 184.108.40.206 • 220.127.116.11
If you would like to know more about your current DNS server settings, you can try out our beta tool which is available here.
If you've determined that your DNS server settings are affected, we recommend that you try these steps: • Disconnecting the router from the Internet and resetting it • Changing the password on the router, especially if it is still the default password • Disabling remote administration on the router • Checking and updating the router to use the latest firmware • Rebooting a desktop system to flush the DNS cache • Scanning the desktop system using a trusted, up-to-date antivirus program