News

Routers With Default Username And Password Can Be Used To Attack Internet Providers


Ever thought your router is secured just because it has the default administrator username and password? Think again! It is reported that many of those home networking devices such as routers will be the next target for cyber criminal groups to commit online attacks.

IOActive researchers Ehab Hussein and Sofiane Taimat said that millions of home routers and gateways will be used to launch multiple attacks on the ISP and create problems for its end users at the same time. These exploits will be used by many cyber criminal groups, hacktivists or even from those with a motive to distribute malware and even committing a denial of service attack on ISPs.

This is possible since internet service providers use ID blocks and assign them to the customer’s premise equipment for easy identification in their back-end process. But by doing so, one can obtain information from routers that use factory setting’s username and password by default assigned by the respected router manufacturers or by ISPs that have their own branded router setting interface.

As expected, wireless networks with default router setting’s username and password can be used easily to launch an attack on the ISPs and disrupt their services. Once attackers get an access via the router, they can extract information about the netblocks and plan their attack over the ISP accordingly. Furthermore, free tools like ‘WhoIS’ and ‘IPInfoDB’ can provide information about the IP addresses assigned by the ISPs with these netblocks such as location, therefore giving them access to the areas’ internet connections.

There was a similar warning given during January when a security firm ‘Rapid 7’ warned about a vulnerability in Universal Plug n Play protocol network devices manufactured by about 1,500 home networking companies.

To make a point to show the vulnerability of this, Hussein and Taimat generated a list of IP addresses and scanned the systems for accessible routers to do a simple attack by using a neighbouring wireless router that uses default login credentials. The end result was that they were able to access more than 400,000 vulnerable systems by accessing through the netblocks via the same router. Had this been hackers instead of researchers, the end result would be series of DDOS, and other attacks possible, followed by issue that ISP needs to face, from the attackers and from the consumers.

IOActive recommends that ISPs that give wireless routers to consumer should stop shipping home networking products with trivial default admin username and passwords. ISPs should also have a system where they can refuse to assign IP addresses on user’s routers which uses default login credentials.

Source: Security Ledger

Roshan Ashraf Shaikh

Disqus Comments Loading...

Recent Posts

Samsung 990 EVO 2TB M.2 NVMe PCIe 5.0/4.0 NVMe SSD/Solid State Drive

The 990 EVO offers enhanced sequential read/write speeds up to 5,000/4,200 MB/s, and random read/write…

3 mins ago

CORSAIR A115 High-Performance Dual-Tower Intel/AMD CPU Cooler

High-Performance Air Cooler with six 6mm heat pipes and a copper cold plate for high-efficiency…

5 mins ago

ASUS TUF 4-in-1 RGB Gaming Peripherals Keyboard Mouse Headset Mouse Mat Bundle

Experience an outstanding performance and exceptional toughness with the ASUS TUF K1 RGB Gaming Keyboard.…

19 mins ago

Crucial MX500 1TB 2.5″ SATA SSD/Solid State Drive

Every time you turn on your computer, you’re using your storage drive. It holds all…

21 mins ago

JBL Flip Essential 2 Portable Bluetooth Speaker

Take your tunes on the go with the powerful JBL Flip Essential 2. Bad weather?…

22 mins ago

No Sim Game Ideas Left? Well, How About ‘Slav Junkie Simulator’

I genuinely didn't see this one coming, in fact, I'm not even remotely sure how…

4 hours ago