Millions Of WiFi Routers Are At Risk Of Hacking

Millions of home Wi-Fi networks are currently at risk of being hacked, a British security company has claimed. But not everyone is convinced it’s an issue. Weaknesses exist in how saved passwords in the browsers Google Chrome and Opera interact with Wi-Fi over unencrypted connections.

That's according to SureCloud researcher Elliott Thompson, who discovered the alleged vulnerabilities and reported them earlier this year.

Thompson claimed that hackers could exploit the weaknesses to hijack a home’s Wi-Fi, steal information from computers connected to the network and even implant malware.

“The hacker would be able to join the WiFi network, access shared files, access 'internet of things' devices which trust the local network [and] view what websites everyone is visiting,” Thompson told Newsweek. “If those websites are unencrypted, the hacker could attempt to implant malware onto the device to steal passwords or access webcams from the computers on the network.”

But there appear to be some major caveats to such an intrusion. According to SureCloud, in order to compromise a home network, the cybercriminal would need to be within Wi-Fi range of the router. 

Additionally, the victim’s device would need to be using the Chrome or Opera browsers that have the router’s login credentials to an open network saved. If so, researchers said they could use software exploits to steal credentials in a minute. 
And it also requires user interaction. In the proof-of-concept attack, the target would need to click a page pop-up that appeared to be their Wi-Fi router’s admin menu for it to work.

SureCloud criticised the fact that Chrome browsers save Wi-Fi router administration credentials and re-enter them automatically—an auto-fill process that is designed for convenience. Obtaining router details could be used to capture the Wi-Fi network password (PSK), SureCloud said.

“Nearly every single home router that uses a web management page [would be impacted],” Thompson claimed. “There are likely hundreds of millions of routers fitting these criteria in use.

“The router is not the only requirement for exploitation,” the security researcher conceded. “It is in combination with saved credentials, Chrome being in-use and the operating system remembering an open Wi-Fi network. These are all criteria that many people will meet.”

A real-world problem? 
But external independent cybersecurity expert Robert Pritchard told Newsweek he remained unconvinced the alleged issue reported by SureCloud was a problem at all.

“The vast majority of Wi-Fi networks these days are encrypted, meaning this attack would not be viable,” Pritchard said. “Even if you can find an unencrypted Wi-Fi network, you would still have to find a victim on said network who is actively using Chrome or Opera, and who had the administrator credentials for the network router saved in the browser.

“Against unencrypted networks the attack hardly seems necessary—there is nothing to stop the attacker joining the network, intercepting traffic or doing any number of malicious things.”
Responding, SureCloud researcher Thompson said: “The target device in the demonstration is connected to a secure, WPA2 protected network, then using the Karma attack the target is brought onto a fake unsecured network to begin the next stage of the attack.

“The first Karma stage of this attack is well known, we have built upon that. The attack is demonstrated to work against WPA2 networks encrypted with a strong pre-shared key (PSK), this is what makes the finding significant. The attack doesn’t require intercepting any traffic.”

SureCloud said it disclosed its findings to Google’s Chromium project on March 2, 2018. Chromium, which maintains the Chrome browser, said the password feature was “working as designed” and that it would not be updated in light of the alleged security weaknesses.

In a statement on Wednesday 5th Sept, Google said: “Security is a core tenet of Chrome and we are committed to providing our users with a secure web experience.

“We appreciate the security community for working with us to bring any concerns to our attention. We’ll study this closely and see if there are improvements to make.”

Users can protect home networks by clearing their Chrome browser's saved passwords, deleting saved open networks and not allowing automatic reconnection to networks, SureCloud said.

Newsweek

You Might Also Read: 

WiFi Can Spy on You:

 

« UK Fallout From The Massive Breach At Equifax
Has Demand For Cyber Security Skills Hit Crisis Point? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Norwegian Business & Industry Security Council (NSR)

Norwegian Business & Industry Security Council (NSR)

NSR is a member organization serving the Norwegian business sector in an advisory capacity on matters relating to crime and security including cyber.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

Labris Networks

Labris Networks

Labris Networks specializes in DDoS mitigation, NG Firewall, Unified Threat Management, Centralized Management, Regulatory Compliances and SOC/CERT Services.

RackTop Systems

RackTop Systems

RackTop Systems is the pioneer of CyberConverged data security, a new market that fuses data storage with advanced security and compliance into a single platform.

DNX Ventures

DNX Ventures

Based in Silicon Valley and Tokyo, DNX Ventures is an early stage VC for B2B startups in sectors including Cybersecurity.

New Net Technologies (NNT)

New Net Technologies (NNT)

NNT SecureOps provides ultimate protection against all forms of cyberattack and data breaches by automating the essential security controls.

Silent Sector

Silent Sector

Silent Sector is a cybersecurity services company that specializes in providing a wide range of managed security services.

Coveware

Coveware

Coveware helps businesses remediate ransomware. We help companies recover after files have been encrypted, and our analytic, monitoring and alerting tools help companies prevent ransomware incidents.

Red Sky Alliance

Red Sky Alliance

Red Sky Alliance (Wapack Labs Corp) is a cyber threat intelligence firm that delivers proprietary intelligence data, analysis and in-depth strategic reporting.

HEQA Security

HEQA Security

HEQA Security (formerly QuantLR) offer the world’s most cost-effective, easy-to-integrate, and secure Quantum Key Distribution (QKD) solution

SubCom

SubCom

How Much Do You Trust Your Endpoint? With our ‘Habituation Neural Fabric’ based endpoint security platform, you can observe and manage the Trust Score of your endpoints in real-time.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

Oxylabs

Oxylabs

Oxylabs is the largest datacenter proxy pool in the market, with over 2 million proxies. Designed for high-traffic, fast web data gathering while ensuring superior performance.

Manifest

Manifest

Manifest is a cybersecurity company dedicated to helping enterprises secure their software supply chains.

Ipseity Security

Ipseity Security

Ipseity Security provide security-centric advisory and consulting services for organizations to secure their perimeter-less digital transformation to meet business and security requirements.

Bluecyber Insurance

Bluecyber Insurance

At Bluecyber, we are revolutionizing the cyber insurance market, democratizing access to digital protection for small and medium-sized businesses.