Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

1/3/2008
06:45 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Urban WiFi Routers at Risk

Indiana University researchers say densely populated wireless routers could be the next method for spreading pharming, script injection, and bot infections

Your crazy next-door neighbor could also be your biggest WiFi security risk: If his wireless router gets infected, it could spread malware to your router as well.

Researchers at Indiana University in Bloomington recently built an epidemiological model of the feasibility of malware rapidly spreading among WiFi routers in a densely populated area. They found in their simulations that tens of thousands of WiFi routers could be infected in two weeks -- and most were infected within 24 to 48 hours.

The researchers then tested their model as a launching pad for drive-by pharming, an attack method demonstrated last year by several of their colleagues in a proof-of-concept attack they co-developed with Symantec. That's where an attacker uses a broadband router vendor's default password to control the router, after first luring the victim to a malicious Website to infect them with malicious JavaScript code. (See New 'Drive-By' Attack Is Remote.)

"I [wondered], why would you be content with that when you could make it self-replicating and attack neighboring routers?" says Steven Myers, assistant professor of Indiana University's School of Informatics, and one of the members of the research team.

So Myers, along with university colleagues Hao Hu, Vittoria Colizza, and Alessandro Vespignani, gathered wireless data from seven urban areas in the U.S. -- Chicago, Boston, New York City, San Francisco Bay Area, Seattle, Northern Indiana, and Southern Indiana – and modeled a malware viral epidemic among WiFi routers akin to the spread of a biological virus.

They found that only 21 percent to 40 percent of wireless routers in those regions used encryption, and they focused on "attacking" those without encryption or with the notoriously weak Wireless Encryption Protocol (WEP). The researchers concluded that WEP can always be broken as long as the attacker has access to sufficient encrypted data.

"This can be achieved by waiting for the router to be used by legitimate clients, or by deploying more advanced active attacks," they wrote. "Bypassing WEP encryption is therefore feasible and only requires a given amount of time."

WEP's weaknesses are well documented. McAfee researchers found that half of the home WLANs they sniffed in war-driving tests over a year ago were unprotected and unencrypted. The team was able to crack those that had WEP encryption on their WiFi routers in less than two minutes. (See Hacking Home WLANs.)

Once WEP is cracked, the attacker is practically "in": Many WiFi routers still use their manufacturer's default password. The researchers weren't able to nail down the number of those users, but used estimates which state that 25 percent of users don't change their router's default SSID. An infected router would then interface with another router over an administrative interface, according to the researchers, who tested that out as well.

Myers says the danger of this type of attack is that, unlike a PC, a wireless LAN is typically "on" all the time, and no security tools today specifically protect WiFi router infection. Still, it's not an active threat at this time: The goal of the researchers is to help get ahead of this type of threat before it becomes a problem.

"I don't think it's a threat right now -- there's so much more lower-hanging fruit" for attackers to exploit, he says. But this attack would be attractive for script injection, pharming, and for botnet operators to build out their botnets, he says.

"This is a whole other platform to infect and attack," Myers says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Virginia a Hot Spot For Cybersecurity Jobs
Jai Vijayan, Contributing Writer,  10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17612
PUBLISHED: 2019-10-15
An issue was discovered in 74CMS v5.2.8. There is a SQL Injection generated by the _list method in the Common/Controller/BackendController.class.php file via the index.php?m=Admin&c=Ad&a=category sort parameter.
CVE-2019-17613
PUBLISHED: 2019-10-15
qibosoft 7 allows remote code execution because do/jf.php makes eval calls. The attacker can use the Point Introduction Management feature to supply PHP code to be evaluated. Alternatively, the attacker can access admin/index.php?lfj=jfadmin&action=addjf via CSRF, as demonstrated by a payload in...
CVE-2019-17395
PUBLISHED: 2019-10-15
In the Rapid Gator application 0.7.1 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.
CVE-2019-17602
PUBLISHED: 2019-10-15
An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated.
CVE-2019-17394
PUBLISHED: 2019-10-15
In the Seesaw Parent and Family application 6.2.5 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.