Brazil's routers were exposed to a new flaw in which a botnet changes DNS settings to steal credentials from sites like banks and other online services.Although this vulnerability is still in action, it is already possible to adopt some preventive measures to avoid risks.Olhar Digital has gathered a series of tips that contain configurations to be made on the router and on the computer to keep you protected against this failure.If you have already been affected by the problem, the last tip of this tutorial tells you how to proceed.Check out how to prevent yourself from GhostDNS first:The list of affected routersThe company responsible for identifying these attacks was Qihoo360 and, to help you know if you are exposed to this vulnerability, they made a list of the main router models that were affected, in addition to providing a complete explanation of how this detected flaw works. .The following is a list of routers affected by the failure:Changes to be made to the routerTo make any of the settings changes listed below, you need to know how to access your router's settings panel.If you don't know how to proceed, just follow these steps:The settings shown below were performed on a TP-Link branded router.Depending on your manufacturer, the layout of the menus or the name of the functions may vary, but the process is valid for all of them.Change router administrator login and passwordTo attack your router, GhostDNS does a kind of remote access to it, but that can be difficult.The first step for this is to change the default login and password for access.To do so, follow these steps:Another important flaw for the GhostDNS botnet to work is that remote access to the router is allowed.Fortunately, this can be prevented by allowing new settings to be made only locally.Look:This tip is standard, but it needs to be followed to the letter because only with the last firmware update is your router protected against security breaches.To update your router, follow these steps:Changing DNS on Router and WindowsIn addition to these changes made above, another important part of the process is setting a DNS server on both the router and the computer.First, here's how to change the router's DNS:If you don't have direct access to your router, another good idea, as stated earlier, is to change DNS directly on your computer, too.Check out how to do it:How to get rid of the threat if you are infectedLast but not least is a tip that is also useful for anyone who has already been infected by GhostDNS.As this botnet changes the router's DNS settings, the solution to get rid of it is to reset the router.For this, you have two options.On the router itself you can look for the “Reset” button, which is usually located on the back of the device.When you press it, you must wait for it to restart and configure it again following the tips above.Alternatively, resetting the router can also be done from the router's control panel.To do so, follow these steps:Ready!With these tips you should already be protected from the GhostDNS botnet.Even if your router is not on the list mentioned above, it is worth carrying out these settings to stay safe and avoid any inconvenience.