Researchers Say Wi-Fi Virus Outbreak Possible 165
alphadogg writes with a link to a NetworkWorld article about a troubling security scenario. Indiana University IT researchers are now saying that a WiFi attack intended to piggyback across unsecured access points could do serious damage in a city like Chicago or New York. By essentially brute-forcing the passwords on insecure routers, a worm-like firmware agent could be introduced to an estimated 20,000 networks in New York City alone. "Although the researchers did not develop any attack code that would be used to carry out this infection, they believe it would be possible to write code that guessed default passwords by first entering the default administrative passwords that shipped with the router, and then by trying a list of one million commonly used passwords, one after the other. They believe that 36% of passwords can be guessed using this technique."
They'll never get me! (Score:4, Funny)
Re: (Score:3, Funny)
Back on topic I wonder what this new breed of virus will be called, if indeed it worked.. Weasles? WAIDs? Winfluenza? Actally Winfluenza could work on so many levels
Re: (Score:2, Funny)
Re: (Score:2)
Re: (Score:2)
Ah, the classics never die, do they? My wifi password is... oh wait I don't have wifi
Only 36%? (Score:2, Insightful)
Re: (Score:2, Insightful)
1/3 is 33 1/3%. How is that severly off of the 36% estimate?
Re: (Score:2, Insightful)
Re: (Score:1)
Re: (Score:2)
I think he means that if 33% alone are default passwords, with another huge chunk (maybe 10% - 15%?) being among the common million.
On a more shocking note: Have you noticed that 40% of Slashdot posts made during the work week are done on Mondays and Fridays?
Re: (Score:2)
90% of the posts I make are during work. i visit three to four times a day. Of course I rarely respond in the same day. when i check my email account in the morning I read the responses to what I said and reply back. That way i don't get into stupid flame wars, or I can shut up when i put my foot on the keyboard.
Re: (Score:2)
I take that as a challenge, peraDUMB! Let's see you resist a flame war with ME!
Re: (Score:2)
Re: (Score:2)
I think he's saying that if 1/3 of all routers have the default password, "brute forcing" those happens in O(1) time, and that if you were brute forcing the remaining 2/3 of all routers, you'd probably find more than 36% are vulnerable.
I mean, if 1/3 are using four or five distinct passwords, those are
Re: (Score:2)
why brute force? (Score:2)
troubling security scenario? (Score:4, Insightful)
Re: (Score:2)
Re: (Score:2)
Just enough intelligence to fetch a few words at a time from a central site, or all the words from a web page the user visited.
Fetch -- try -- refetch. Only a few k of memory, if that.
If it's stealthy enough, keeping a low profile, programmed well enough, it might have a very long time to attempt to brute force other routers.
How many different firmware images does it need access to? Probably not that many. 10 leading brands, 10 ~ 20 main models each? Once the type of the victim
Re: (Score:2)
Yes, and that's why we are still there 17 years later. The military is always one battle behind. By the time we get a hold on the Middle East, the next flare-up will kick in, and we'll be totally unprepared for it as well, because we focused entirely on the Middle East, and didn't consider other potential threats.
But your tech points are right on, and I love the analogy re-use as well ;-)
Re: (Score:2)
Re: (Score:2)
Oh no! Imaginary problems are best dealt with by imaginary solutions, You hold a Press Conference and weave imagery to the media. Then they write it up. imagining they have it right. Face it, they lack the imagination on their own. Imagine that...
- I craftily set my D-Link SSID to "Linksys"
Re: (Score:2)
The vast majority of the "hackers" out there likely simply try the default admin password (and assuming that the Dlink is different) would give up and move on.
-nB
Varying router models and revisions (Score:5, Insightful)
On another note, configuring the router for administrative access only via ethernet would completely stop the problem.
Dan East
Re: (Score:2)
Re: (Score:2)
I wonder if it is too much to expect that when the routers are first set up, the default password should expire on the first log-in and should require a different password. Are there any routers out there that do this? How come this isn't default behavior?
Re: (Score:2)
I'm betting most of these default name/password routers around have never been logged into even once by the owner.
Re: (Score:2)
Re: (Score:2)
Funny, if it weren't so painfully true. At a recent booze-up, one of the group comes up to me (resident technical person) and asks how they set up their new wireless modem-router at home. I asked them if they had accessed it like a web-page, with the usual 192.168.blah.blah address.
"That's what they [whoever THEY are] told me to do on the phone, but it won't connect still."
"Did you try connecting the computer to the thing usin
Re: (Score:2)
Re:Varying router models and revisions (Score:4, Insightful)
They are getting there. A Linksys I recently picked up had a label over the ports reminding you to RUN CD FIRST. I'm assuming their CD will do things like change passwords and turn on encryption (wouldn't know since I prefer to do that manually).
Re: (Score:2)
Re: (Score:2)
They should just do what the wireless servers at a lot of hotels do: redirect all http requests to an internal page server. Only instead of going to a billing page, if no password is set, the first page is the setup page.
ASIDE: Come to think of it, why is only the wireless bit encrypted? Shouldn't the wired links also be encrypted? It's not like that's compute expensive anymore.
Of course, then they'd have to remember set t
Re: (Score:2)
Why would you want to do that? What possible use would it be? I can SEE exactly what is wired into my router.
How about encrypting the link between your keyboard and PC? Your monitor? ... Looks like you've just invented Palladium.
Re: (Score:2)
I meant encryption that you, as the user, have control over. Keyboard and monitor encryption are actually not bad ideas. They prevent a certain kind of invasion of privacy that is unlikely, but the cost of implementing them would also be low, so the cost is in line with the risk. As long as YOU can decide if you want it, and you can still use a the full capabilities of a monitor that do
Re: (Score:2)
Re: (Score:2)
A little switch labelled program/run would work to prevent modifications of any settings when in the "run" position. Anyone who wanted/needed to change any settings would need physical access to the router. When switch is in "program", the router doesn't connect to the Internet. Companies could fix this for little extra cost.
Re: (Score:3, Interesting)
How many router models and hardware revisions would the worm need to support to make this effective?
Since wireless routers are (usually) connected to the Internet, the worm could "phone home" to some central repository in order to get the code it needs to attack different models. What I mean is that the virus wouldn't need to carry code for all makes/models. Instead, an infected access point would scan nearby access points (or computers) for open or crackable connections, and then access a central store for the exact methodology/code/virus needed to spread to those new access points. This also means that
Re: (Score:2)
Since nearly every router can be presumed to have a wide-open (and likely quite fast) pipe to the Internet, there are plenty [torproject.org] of ways [bittorrent.org] to get around [freenetproject.org] the need to have a central server. Some others are rather unknown [wikipedia.org], or even a bit old [wikipedia.org], but those reasons by themselves don't make them inapplicable to the role.
Storage for all of this can be a problem, but that's an easy one to solve: The small size that such a worm must be combined with the relatively large amount of bandwidth available on each
Not that hard (Score:3, Interesting)
Then all a worm would need to is gain access to the router, and then notify the server that it has been cracked. The server takes it from there... it would connect to the router, identify its model number from the status page, and upload the appropriate firmware.
With a little ingenuity it would not be
Re: (Score:2)
Re: (Score:2)
WEP virus wants to infect your router... can you please hold down reset for 6 seconds and start a TFTP server so the virus can infect your router??
I call wishful doom. Getting DD-WRT on most of these things is a PITA enough, a Virus that will silently install it's self on everything?? yeah right. there has not been a router made that did not require special tasks to flash the firmware to something else other than a blessed version from the maker for over 3 y
Re: (Score:2)
Re: (Score:2)
Out of they box they are WEP based and have their serial number as a password. (So if you don't feel like sniffing it you can easily brute force it).
There is no manual provided with it and no indication of how to change the password or run in WPA. (Fair enough. For most people that would just confuse them but it took some
Re: (Score:2)
There is a German company, AVM shipping routers mostly in Europe that does the right thing. The router is shipped with a random WPA key and admin password which is distributed on a label stuck on the box. Not only that, they are also now choosing the optimal channel based on least interference. With such a device it is usable out-of-the-box for almost anyone sensible enough to use a comput
Simple Solution (Score:3, Funny)
Solution: Use any of the 64 percent of the pwds
Not that likely... (Score:2)
Even though a lot of people are idiots and leave the password at the default, there are still at least 3 or 4 different types of hardware (think Belkin, D-Link, NetGear, etc., and all the different models they each have available) that are in common use. This means that to be fully effective, a virus would need to contain several different firmware images of itself, and would have to store it all in the limited space available in the flash memory of the infected unit.
Of course, you could choose to infe
Re: (Score:2)
Re: (Score:2)
rj
Really? (Score:4, Interesting)
Unfortunately, that means that I can no longer log in to those routers with default passwords and open up ports for myself when I'm on some stranger's network and it requires me to plug in when I need to make changes on my own networks.
Of course, you should disable access to the administrator pages over the WLAN (or restrict it to a maintenance port if your router has one), change your administrator password (and username, if possible) and make sure you've got strong encryption with a strong password/key.
When I was living in manhattan (2004-2005), there were over 20 visible wireless access points from my apartment. Running kismet and walking from the front to the back of my apartment with my powerbook, I could pick up closer to 30 networks and about 3/4 of them were password protected; mostly with WEP. Nowadays, living in brooklyn, I can pick up around 15 wireless networks and all but 2 are password protected and most are using WPA or WPA2.
Re: (Score:2)
The trick is all you have to do is lock the front door. That prevents most random theives. though if your sharing music via P2P unlock your router. that way you can blame others.
Re: (Score:3, Insightful)
I know it was that way on my linksys.
Re: (Score:2)
Damn stupid if you ask me.
Re: (Score:2)
Yeah, like my Nintendo DS. Although my Wii gets onto our network without issue.
And I'm not sure if this is still the case, but I've had significant issues getting XP machines to log into WPA2 protected wireless networks. There was supposedly a separate update which fixed that and gave you the ability to connect to such a network, but I was unable to get it installed/working a
Re: (Score:2)
The problem with WPA is that certain manufacturers of certain non-computer wifi-devices decided not to support anything other than WEP...
Damn stupid if you ask me.
This is the problem that I have. I needed to get my living room devices connected to my wireless router in my office, but the access points that are available either aren't compatible with my router, or only support WEP when used as a wireless bridge. There's probably a solution, but I'm not a networking genius, so I don't know what it is, and with all the various devices out there, it's hard to tell what will work and what won't without actually trying them in my specific setup. That would get expensiv
Re: (Score:2)
Re: (Score:2)
Unfortunately? You were taking advantage of a security flaw that has now been fixed.
Re: (Score:2)
I can pick up around 15 wireless networks and all but 2 are password protected and most are using WPA or WPA2.
When i moved into my new apartment and saw a similar scenario I went "SUHWEEEEET!" and busted out the ubiquiti gear, the amps, a giant satelite-dish-sized directional antenna and its tripod, and few soekris boxen.
Oh, and a little openwrt box that runs my wireless network. If you ever see a network called "secret_awesome" go ahead an join, i leave it open for anybody to use (you're going to get subnetted away from me though).
Please tell me I'm not the only one who did that...cause that would be really sad.
Re: (Score:2)
I thought about it for a while but decided against simply leeching off the neighbor forever since I like to have some degree of control
Re: (Score:2)
I've only used the ethernet ports once or twice, and have always been able to administer it over the air. It's the default settings. Also, two of my neighbors have unsecured AP's, both Linksys, and both allow WLAN configuration. One is setup to allow remote configuration by default (the owner has never edited a setting, I doubt he/she has turned this, of all features, on - it's hidden in the advanced setup pages).
AP's that hav
Re: (Score:2)
really? I'll have to doublecheck. I'm 99% sure I didn't change whatever the default settings are on the one in my apartment (my roommate's unit) and that one doesn't allow wireless administr
Video Presentation of Paper (Score:2, Informative)
Common Sense Should Prevent This (Score:3, Insightful)
Just my take on it.
Re: (Score:2)
Re: (Score:2)
Why is it ineffective? Is there some way to spoof a MAC Address? If so, how could someone get the MAC address of another computer they do not have physical access to?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
In order to find out the MAC address of another computer across wireless, you just have to snoop on the packets (use wireshark). The MAC address is right there (otherwise how would the router find it out?)
Now if everything is encrypted with a scheme that isn't broken (WPA not WEP), then snooping becomes impossible. But if you are using WPA already, MAC filtering
Re: (Score:2)
All else aside, MAC address filtering does no damage other than increased administrative burden... it makes wireless security no worse, even if its benefits are only marginal.
Re: (Score:2)
Re: (Score:2)
If only you had a SHARK with a laser strapped to its head. Then your router would truly be secure.
Re: (Score:2)
And MAC filtering takes exactly zero time to bypass once you know it's in place - some tools constantly read all connected MAC's of all nearby radios and "change" to take over their MAC with a single click. You have to TRANSMIT your MAC for any sort of networking to work, and it's
It's too difficult to use strong passwords (Score:2, Informative)
Church of Wifi already did this (Score:5, Informative)
The key to this kind of attack, is that it could be potentially undetectable - how do you know if the linksys firmware was replaced or slightly modified or not?
Another great use, would be to drop TOR endpoints on every single box infected
Re: (Score:2)
I was wondering the same, how to verify that a router has the firmware I think is on it. It seems the only reliable way would be to
Re: (Score:2)
Re: (Score:2)
Church of Wifi has a hacked firmware-based worm that runs around and replaces firmware on APs, and then looks for other AP's to attack, and propagates itself. The key to this kind of attack, is that it could be potentially undetectable - how do you know if the linksys firmware was replaced or slightly modified or not? Another great use, would be to drop TOR endpoints on every single box infected :)
Maybe that's why my Linksys router stopped working?
A couple of weeks ago, my network started acting very strange. My computers couldn't see each other through the LAN, and my wireless network disappeared. I figured out that the router was doing some kind of a soft reset every second; it ended up getting one of my DynDNS domains disabled due to abusively updating my domain. I couldn't reset the router with the physical button, so I replaced it with an Apple router that supports WPA2.
Re: (Score:2)
Re: (Score:2)
Why not make the password something like a printed number on the router itself? I know it's encoded in firmware, especially with the factory reset button, but it's not too hard to say read the ID and print up corresponding stickers. They already do it for the MAC address information.
That would require either 1. compiling a new firmware for EVERY unit, or 2. storing the password in a separate chip, which increases parts, cost, and everything else. They might be able to bypass the drawbacks of #2 by using the LAN side MAC tho, since that shouldnt be accessible via wifi for most wifi "routers" (tho a simple AP might be.. not as familiar with those), unlike the wifi MAC thats transmitted to all.
tm
Re: (Score:2)
Huh? (Score:2)
"Although the researchers did not develop any attack code
"Scenario?" With a "worm-like software agent?" Wake me up when (a) such a firmware worm is written or (b) when someone from the security community can be a little more specific as to how such a worm could work. I remain skeptical.
After all, they've been telling us about Linux and Mac viruses for years, but I have yet to hear of anyone actually gettin
Who Cares? (Score:2)
Folks with real and/or sensitive data will have a password, and likely even more security.
Those that don't likely have little to offer any hacker or anybody else. A hacker may desire your cycles for zombified attacks, and the RIAA might like to look at your MP3 list. Maybe someone might go through the trouble of trying to data mine for identity theft, but again there are much easier ways to accomplish th
Similar work (Score:2, Interesting)
Full paper is available at one of the authors' website. http://s3g.i2r.a-star.edu.sg/papers/metrowifi-usenixsec07.pdf [a-star.edu.sg]
Brute forcing WiFi Passwords (Score:2)
Cracking the password and getting network access isn't the same as getting past the firewalls, installing yourself on the machine and getting something to run you. Someone is fear mongering, or has failed to think this through.
It'll activate itself... (Score:4, Funny)
Aaaah!!! We're to late. Run for the hills!!
Virii should create fake routers instead (Score:2)
I don't have any practical experience with this, but theoretically, I think a virus could be created that would infect windows computers and enable internet sharing off the wireless card. It would look at the name of the existing wireless connection and then call the shared connection '+1'. Then when zombied laptops go to coffee shops, etc. they become an additional wireless access point named 'coffee shop2'. Others mistakenly connect to the internet through this spoofed access point and all their outgoing
Re:1 million passwords? (Score:5, Insightful)
Re: (Score:2)
OMG, Skynet!
Re: (Score:2)
Wrong!
You only need one computer to begin the process.
It can be done. To avoid it, you should change your admin inter
Re: (Score:2)
Re: (Score:2)
Well, you could have it download the firmware image from the Internet (IRC or p2p) according to the device you are attacking. The worm itself would be just a little "hack" in the firmware image. And you don't have to bother with all brands and models: start with the most popular ones (Linksys' W54GL, and the like). Some of those already have open source versions of their firmware, meaning you don't really have to reverse-engineer everything.
My point is: it is not impossible. Wifi router will meet all the
Re: (Score:2)
Let's not get our panties in a bunch.
According to the "5 best hacks of 2007" article of a few days ago, it's getting hard to find an open AP these days and
even if you find one, most manufacturers are now shipping APs with admin access disabled on the WAN interface by default.
Then again, the same article said that running a packet sniffer on a open AP and grabbing cookies ("sidejacking") was one of the top 5 hacks. If our security profes
Re: (Score:2)
Re: (Score:2, Funny)
Re: (Score:2)
Even public wifi has an effective range of about 30 feet from the source.. you might be able to pickup starbucks from the mcdonalds next door (as you can around here - mcdonalds didn't bother with wifi presumably for that reason) but how
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
First, the router providing the wireless AP access should not be the same router firewalling your LAN from the rest of the Internet. This keeps "management" ports that might accidently be open from being Internet accessible. This is hard sometimes. One router I have has two connections to my little LAN, one from one of its machine ports, and one from its "internet" port. This allows it to check for firmware upgrades and whatnot, l
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Password lockout on incorrect logins is standard procedure - any reasonably locked down network will do it.