Millions Of WiFi Routers Are At Risk Of Hacking

Millions of home Wi-Fi networks are currently at risk of being hacked, a British security company has claimed. But not everyone is convinced it’s an issue. Weaknesses exist in how saved passwords in the browsers Google Chrome and Opera interact with Wi-Fi over unencrypted connections.

That's according to SureCloud researcher Elliott Thompson, who discovered the alleged vulnerabilities and reported them earlier this year.

Thompson claimed that hackers could exploit the weaknesses to hijack a home’s Wi-Fi, steal information from computers connected to the network and even implant malware.

“The hacker would be able to join the WiFi network, access shared files, access 'internet of things' devices which trust the local network [and] view what websites everyone is visiting,” Thompson told Newsweek. “If those websites are unencrypted, the hacker could attempt to implant malware onto the device to steal passwords or access webcams from the computers on the network.”

But there appear to be some major caveats to such an intrusion. According to SureCloud, in order to compromise a home network, the cybercriminal would need to be within Wi-Fi range of the router. 

Additionally, the victim’s device would need to be using the Chrome or Opera browsers that have the router’s login credentials to an open network saved. If so, researchers said they could use software exploits to steal credentials in a minute. 
And it also requires user interaction. In the proof-of-concept attack, the target would need to click a page pop-up that appeared to be their Wi-Fi router’s admin menu for it to work.

SureCloud criticised the fact that Chrome browsers save Wi-Fi router administration credentials and re-enter them automatically—an auto-fill process that is designed for convenience. Obtaining router details could be used to capture the Wi-Fi network password (PSK), SureCloud said.

“Nearly every single home router that uses a web management page [would be impacted],” Thompson claimed. “There are likely hundreds of millions of routers fitting these criteria in use.

“The router is not the only requirement for exploitation,” the security researcher conceded. “It is in combination with saved credentials, Chrome being in-use and the operating system remembering an open Wi-Fi network. These are all criteria that many people will meet.”

A real-world problem? 
But external independent cybersecurity expert Robert Pritchard told Newsweek he remained unconvinced the alleged issue reported by SureCloud was a problem at all.

“The vast majority of Wi-Fi networks these days are encrypted, meaning this attack would not be viable,” Pritchard said. “Even if you can find an unencrypted Wi-Fi network, you would still have to find a victim on said network who is actively using Chrome or Opera, and who had the administrator credentials for the network router saved in the browser.

“Against unencrypted networks the attack hardly seems necessary—there is nothing to stop the attacker joining the network, intercepting traffic or doing any number of malicious things.”
Responding, SureCloud researcher Thompson said: “The target device in the demonstration is connected to a secure, WPA2 protected network, then using the Karma attack the target is brought onto a fake unsecured network to begin the next stage of the attack.

“The first Karma stage of this attack is well known, we have built upon that. The attack is demonstrated to work against WPA2 networks encrypted with a strong pre-shared key (PSK), this is what makes the finding significant. The attack doesn’t require intercepting any traffic.”

SureCloud said it disclosed its findings to Google’s Chromium project on March 2, 2018. Chromium, which maintains the Chrome browser, said the password feature was “working as designed” and that it would not be updated in light of the alleged security weaknesses.

In a statement on Wednesday 5th Sept, Google said: “Security is a core tenet of Chrome and we are committed to providing our users with a secure web experience.

“We appreciate the security community for working with us to bring any concerns to our attention. We’ll study this closely and see if there are improvements to make.”

Users can protect home networks by clearing their Chrome browser's saved passwords, deleting saved open networks and not allowing automatic reconnection to networks, SureCloud said.

Newsweek

You Might Also Read: 

WiFi Can Spy on You:

 

« UK Fallout From The Massive Breach At Equifax
Has Demand For Cyber Security Skills Hit Crisis Point? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NuHarbor Security

NuHarbor Security

NuHarbor is a leading information security consulting and advisory firm specializing in Information Security, Compliance, and Risk Management.

Global Knowledge Training

Global Knowledge Training

Global Knowledge is a worldwide leader in IT and business training, featuring Cisco, Microsoft, VMware, IBM, security, cloud computing, and project management.

NQA Certification

NQA Certification

NQA provides certification to a range of ISO standards including ISO 27001 for information security management.

Vera Security

Vera Security

Vera is a data security platform that provides 360-degree visibility and control over critical business data, anywhere it's shared or stored.

Seclab

Seclab

Seclab is an innovative player in the protection of industrial systems and critical infrastructure against sophisticated cyber attacks.

Cyber Threat Intelligence Network (CTIN)

Cyber Threat Intelligence Network (CTIN)

CTIN provides cyber threat intelligence services including training, platform evaluation, ISAC/ISAO systems development and counter botnet operations.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

CybergymIEC

CybergymIEC

CybergymIEC is a global leader in cyber defense solutions and training services.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

Cygilant

Cygilant

Cygilant is a SOC2 certified service provider that combines MSSP and Incident Detection and Response (IDR) capabilities managed by global SOCs staffed with trained security engineers.

Quadible

Quadible

Quadible BehavAuth is an AI-platform that continuously authenticates the users, without the need of any input, by learning their behavioural patterns.

Hellenic Accreditation System (ESYD)

Hellenic Accreditation System (ESYD)

ESYD is the national accreditation body for Greece. The directory of members provides details of organisations offering certification services for ISO 27001.

IAR Systems

IAR Systems

IAR Systems are a frontrunner in a changing industry, and a future-proof software supplier enabling the IoT.

Nardello & Co

Nardello & Co

Nardello & Co. is a global investigations firm with experienced professionals handling a broad range of issues including Digital Investigations & Cybersecurity.

Unified National Networks (UNN)

Unified National Networks (UNN)

UNN’s mission is to unify the national networks and create a modern and cost efficient digital platform connecting the entire country.

AI or Not

AI or Not

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions.