{"id":12584,"date":"2014-02-19T14:31:31","date_gmt":"2014-02-19T20:31:31","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=12584"},"modified":"2014-02-19T15:09:03","modified_gmt":"2014-02-19T21:09:03","slug":"home-routers-pose-biggest-consumer-cyberthreat","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=12584","title":{"rendered":"Home Routers Pose Biggest Consumer Cyberthreat"},"content":{"rendered":"<blockquote><p>Of the small-office, home-office routers evaluated, every one could be compromised with relative ease by hijacking DNS connections, exploiting HTTPS flaws, weaknesses in Universal Plug and Play services, cross-site-scripting attacks, file-traversal and source-code vulnerabilities, weaknesses in WiFi Protected Setup (WPS), buffer overflows or simply bypassing authentication requirements.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/slashdot.org\/topic\/datacenter\/home-routers-pose-biggest-consumer-cyberthreat\/\">Home Routers Pose Biggest Consumer Cyberthreat<\/a>.<\/p>\n<blockquote><p>During late 2013 and early 2014, gangs of Polish hackers have robbed thousands of consumers by attacking home routers and changing DNS settings so they point at the attackers\u2019 DNS servers rather than legitimate servers.<\/p><\/blockquote>\n<p>DNS is a big problem.\u00a0 Usually devices behind a SOHO router will receive their DNS info from the router via DHCP.\u00a0 The router has been configured by the owner using DNS settings from their ISP or they could use one of Google&#8217;s servers like 8.8.8.8.\u00a0 A user of their home network should expect a higher level of security unlike the open wifi people use on the road.<\/p>\n<p>The simplest remedy is never allow router management access from the Internet.\u00a0 This is usually turned off by default.\u00a0 Routers should be set and forget so using the maintenance interface should be a rare occurrence.\u00a0 The TP-LINK outlined <a href=\"http:\/\/securityevaluators.com\/knowledge\/case_studies\/routers\/tp-link_wr1043n.php\">here<\/a> requires a user to click a malicious link while in a management session according to this:<\/p>\n<blockquote>\n<h2>Attack Requirements<\/h2>\n<ul>\n<li>The victim must have an active management session with the WR1043N.<\/li>\n<li>The victim must be <strong>fooled in to performing an action<\/strong> (e.g., by clicking an attacker provided link), browse to a malicious or compromised site, or be the victim of a man-in-the-middle attack.<\/li>\n<\/ul>\n<\/blockquote>\n<p>Here again the user gets tricked into becoming compromised so this wouldn&#8217;t be a problem if the user simply entered the management interface of the router, made changes, and left. There&#8217;s no point lingering around in a management session.<\/p>\n<p>A physical dedicated firewall sitting between the Internet and treating all routers as dumb access points makes for an added layer of security.\u00a0 All SOHO routers are relatively cheap embedded devices.\u00a0 It is impractical to even expect them to defend against all possible exploits.\u00a0 By virtue of being on the Internet everyone gets constantly scanned by bots.\u00a0 That only poses a problem if the bot sees a vulnerability and phones home listing your device as a possible target.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Of the small-office, home-office routers evaluated, every one could be compromised with relative ease by hijacking DNS connections, exploiting HTTPS flaws, weaknesses in Universal Plug and Play services, cross-site-scripting attacks, file-traversal and source-code vulnerabilities, weaknesses in WiFi Protected Setup (WPS), &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=12584\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[110],"tags":[238,291,101,812],"class_list":["post-12584","post","type-post","status-publish","format-standard","hentry","category-networking","tag-firewall","tag-routers","tag-security","tag-soho"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/12584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12584"}],"version-history":[{"count":6,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/12584\/revisions"}],"predecessor-version":[{"id":12592,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/12584\/revisions\/12592"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12584"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}