News

Routers With Default Username And Password Can Be Used To Attack Internet Providers


Ever thought your router is secured just because it has the default administrator username and password? Think again! It is reported that many of those home networking devices such as routers will be the next target for cyber criminal groups to commit online attacks.

IOActive researchers Ehab Hussein and Sofiane Taimat said that millions of home routers and gateways will be used to launch multiple attacks on the ISP and create problems for its end users at the same time. These exploits will be used by many cyber criminal groups, hacktivists or even from those with a motive to distribute malware and even committing a denial of service attack on ISPs.

This is possible since internet service providers use ID blocks and assign them to the customer’s premise equipment for easy identification in their back-end process. But by doing so, one can obtain information from routers that use factory setting’s username and password by default assigned by the respected router manufacturers or by ISPs that have their own branded router setting interface.

As expected, wireless networks with default router setting’s username and password can be used easily to launch an attack on the ISPs and disrupt their services. Once attackers get an access via the router, they can extract information about the netblocks and plan their attack over the ISP accordingly. Furthermore, free tools like ‘WhoIS’ and ‘IPInfoDB’ can provide information about the IP addresses assigned by the ISPs with these netblocks such as location, therefore giving them access to the areas’ internet connections.

There was a similar warning given during January when a security firm ‘Rapid 7’ warned about a vulnerability in Universal Plug n Play protocol network devices manufactured by about 1,500 home networking companies.

To make a point to show the vulnerability of this, Hussein and Taimat generated a list of IP addresses and scanned the systems for accessible routers to do a simple attack by using a neighbouring wireless router that uses default login credentials. The end result was that they were able to access more than 400,000 vulnerable systems by accessing through the netblocks via the same router. Had this been hackers instead of researchers, the end result would be series of DDOS, and other attacks possible, followed by issue that ISP needs to face, from the attackers and from the consumers.

IOActive recommends that ISPs that give wireless routers to consumer should stop shipping home networking products with trivial default admin username and passwords. ISPs should also have a system where they can refuse to assign IP addresses on user’s routers which uses default login credentials.

Source: Security Ledger

Roshan Ashraf Shaikh

Disqus Comments Loading...

Recent Posts

Drug Dealer Simulator 2 will premiere on 20 June 2024 on Steam

We've been having a good bit of fun in the office playing Drug Dealer Simulator,…

56 mins ago

Philips EVNIA 49-inch QD OLED Curved Gaming Monitor Launches in North America

The Philips Evnia 49″ 5120×1440 240Hz QD-OLED HDR Ultrawide Gaming Monitor is by far one…

2 hours ago

Apacer AS2280F4 PCIe Gen5 1TB M.2 SSD Review

Apacer is a leading name for high-performance storage and memory, and now with the release…

20 hours ago

Corsair Launches New RS MAX Series Fans

Corsair already has the enthusiast market taken care of, with one of the most comprehensive…

1 day ago

NVIDIA RTX Remix Gets DLSS 3.5 With Ray Reconstruction

The wealth of incredible RTX Remix mods has been pretty amazing, as we've seen so…

1 day ago

SteelSeries Unveils The White Arctis Nova Pro Series Headphones

SteelSeries has always had some of the absolute best gaming headsets on the market, spanning…

1 day ago