Communications Interface and Integration

What's New | Site Map | Contact CII
Paul's Home Page | Heritage Festival Training Pages
Age of Mythology Mods | Wing Commander Mods
VA3OPP Home Page | VA3OPP Operating Activities
NORL Home Page | NORL Listings | NORL Login
A.R.E.S. Home Page | A.R.E.S. Login
topLeftCurve topRightCurve

Wireless Router Warning

Page Updated: 2010-09-29
New Type of Threat
There is a very interesting new threat out there called Drive-by-Pharming..
A potential threat for broadband routers has been announced. The exploit is popularly called "Drive-by Pharming".
This new threat has the potential to allow an attacker to gain control over a user's broadband router and home network thus allowing the attacker to steal private information, install malware, or use the home network to distribute spam.
The attacker would do this by creating a web site that pretended to be a legitimate web site such as a bank or online shopping site.
When a user visited the site, malicious JavaScript embedded in the site would then launch and reconfigure the router to use the attacker's DNS servers instead of those prescribed by the user's ISP.
DNS servers are similar to directories that cross reference information, similar to phone books.
All computers on the internet have a numerical reference called an IP address.
DNS servers cross reference web site names (www.someplace.com) to the numerical address.
Therefore, once the router is reconfigured, the attacker can redirect any name entered to a malicious site of his choice.

While there are no known cases of this particular exploit actually in use, proof of concept code has shown it to be possible and effective.
Fortunately, simply changing the default administrative password of the router easily mitigates the risk!
All broadband routers are shipped with an administrative account and a default password, usually something like "password" or "admin" and most users never change these to a stronger password.
This is a relatively easy task, the user would just need to log into the router's IP address (usually something like 192.168.0.1 or 192.168.1.1) and log in with the default password - see the documentation or go to one of the online databases such as http://www.routerpasswords.com to determine the default password.
Then set a new password and you have eliminated the risk!

Some popular router manufacturers and their online instructions are: D-Link and Linksys
Warning Distributed by AVG Reseller Services.
What's New | Site Map | Contact CII
©2007 va3pc software