Virus Can Infect Wi-Fi NetworksAdded: Thursday, March 6th, 2014
Category: About Torrents > Staying Safe And Secure
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
The researchers have recently created a Wi-Fi virus that can spread through populated areas like the common cold can spread between humans. The experts designed and simulated an attack by a virus dubbed “Chameleon”. It turned out that the virus spread quickly between homes and businesses, but couldn’t avoid detection and identify the points at which Wi-Fi access is least protected by encryption and passwords.
Although this Wi-Fi attack was only a computer simulation, the researchers found that their virus behaved just like an airborne virus. They believe that it may have the following explanation: since areas that are more densely populated have more APs in closer proximity to each other, the Chameleon propagated more quickly, especially across networks connectable within a 10-50 meter distance.
The researchers pointed out that when “Chameleon” attacked an AP the virus didn’t affect how it worked, but could collect and report the credentials of all other Wi-Fi users connected to it. Chameleon then used this information to connect to and infect other users. If an AP was encrypted and password protected, Chameleon just moved on to find the APs that weren’t strongly protected. Of course, coffee shops and airports turned out to be hotbeds of infection.
The researchers admitted it was earlier assumed that it‘s impossible to develop a virus able to attack Wi-Fi networks. However, this experiment showed that it’s actually possible and such virus, if created in real life, will spread very quickly and harm lots of Internet users.
March 06th,2014Posted by:
Thursday, March 6th, 2014
|posted by (2014-03-06 19:27:01)|
|So the morons just HAD to go and tell the WORLD about it, and give malicious hackers/scammers a new target of opportunity. BEFORE this they didn't even try as they 'earlier assumed that it‘s impossible to develop a virus able to attack Wi-Fi networks' ... now they KNOW it's NOT impossible and gives them another means to attack people's portable devices.|
|Exactly, What I thought (CRASH1)! What a bunch of trolls!|
|It would have happened neways sooner then later but yah troll|
|posted by (2014-03-07 01:33:27)|
|I wonder if I can buy into ethernet stocks...|
|posted by (2014-03-07 03:39:48)|
|Who are those researchers, and is there any way to contact them?|
I oughtta send them an email giving them a pizzed-off piece of my mind.
Seriously, they just HAAAD to let everyone know this information.
Well as #3 Codyscots stated, Yes this would've happened sooner or later.
But now that it's been broadcast as an invitation to hackers as an Open Door to attack wifi networks, yeah this is something to worry about.
I agree with #1 Crash1 those researchers are indeed Trolls to the fullest.
|posted by (2014-03-07 03:43:50)|
|"The researchers"? Like there is only a specific group that are known as "The researchers"? Without details, the story as written is not correct. It doesn't infect the AP, therefore its not a "Wi-Fi virus". It spreads over Wi-Fi, but so does nearly all virii. That's like saying all virii are Ethernet virii. In an open AP, you can either get the other user's credentials by physically sniffing the traffic (which requires wifi hardware, which is not part of hardware) between STA and AP, or by sniffing the Ethernet traffic, which has nothing to do with Wi-Fi, since its on the LAN.|
"AP the virus didn’t affect how it worked" and "If an AP was encrypted and password protected, Chameleon just moved on to find the APs that weren’t strongly protected." These are disagreeing statements. There is NO normal operation of an AP to provide user credentials.
Either way, there is very little of this story that provides facts or useful information and I call shenanigans on SaM.
|posted by (2014-03-07 03:57:20)|
|"A new form of compromised AP attack has been demonstrated and analysed in , called the 'Chameleon’ attack, perpetrated by the Chameleon virus. This attack replaces the firmware of an existing AP and masquerades the outward facing credentials. "|
So it's what I thought. Not reported correctly. The AP is changed.
What you probably got confused about, is that there was a WhitePaper making the rounds today that talks about DETECTING the Chameleon virus. When it initially came out, it wasn't able to be detected by existing IDS methods. So the new NEWS is that researchers are saying they can identify such an infected AP.
So I reiterate, it's important to name your sources, and its important to present FACTS.
|posted by (2014-03-07 06:20:53)|
|"“When Chameleon attacked an AP it didn’t affect how it worked, but was able to collect and report the credentials of all other WiFi users who connected to it,” Profesor Alan Marshall explained. “The virus then sought out other WiFi APs that it could connect to and infect.”"|
Well, at least now I know who said such a thing. Tomato, tomatoe. He should be saying "appears to not affect it", but if it CHANGES OUT THE FIRMWARE AND CHANGES BEHAVIOUR WITHOUT APPEARING TO DO SO, then its not true to say "it didn't affect how it worked", especially if it has counter measures to hide and protect itself. The difference mainly is the AP is controlled and actively deceiving while appearing not to be, as opposed to be externally being read upon (by not "didn't affect how it worked") through normal operation (which it isn't).
Anyways, I gotta stop reading these damn "articles". Too much nonsense and the people who read them actually believe them to be accurate
|@ Timbo... actually you should continue to read and inform. I want to thank you for the info I always read comments after reading such news, just to see what people are saying about what they just read. again thanks Timbo|
|So this is a simulation based on an open wifi AP and while it may spoof and update an unprotected wifi it is not going to bypass one with encryption,I am so glad my AP is set as a modem for my other router and which doesn`t keep logs and is encrypted as is the one I have set to a modem only from my ISP.|
Why have 2 routers one may ask,the answer is simple I assume the ISP distributed router to be pre-hacked at the firmware level to do this virus`s job anyway and so I do not use the ISP one as a router and hide the real router behind it and my PC`s IP is not even visible in the table as well as being linux.
|posted by (2014-03-07 23:41:39)|
|The router freezes if do not have the firmware and if you are owner of the router is upgraded from the isp and its products. In addition, the affected will be from a broadband isp not from your home safe. besides all, from server to server every day there is news in virus infected and if it is known that the ISP has security filters through his teeth as the news is handled. Drivers are depending on the brand and magic operating system to run everything organized. In short, the wifi is futuristic forever if small devices have no problems in time to get ready and help some brands have progressed.|
|News flash researchers,anti virus companies,anti malware etc all do this and Publish regularly not big secret. I usually get em few weeks before the public and press. How we at Cyber Command stay ahead of the Game not to mention our own in house. So relax get over it,how its done.|
|posted by (2014-03-08 09:24:11)|
|leave it to sam to put out something that does more harm then good.|
|posted by (2014-03-08 16:00:33)|
This isn't new; NSA has been using something like this for a while. When we find out about something like this; it more than likely has been and already being used by the "spooks".
The common thing here is only "unsecured" AP's are "infected". So secure your damn AP's..
The other thing is this "bug" could not carry all the different manufacturers firmware with it; it would be huge and wouldn't fit in the EPROM in the routers. So more likely it infects and phones home to down load an update; maybe trying to do it when network activity is low so it would go unnoticed by the network interruption and reboot needed.
The initial infection would have to use some common denominator ALL ROUTER MANUFACTURERS USE to do the initial "flash" to infect the AP's. One comes to mind the mentioned unsecured AP's; default log in haven't been changed by the user so it might "log in" to access the routers admin page and initiate the flash to infect the router; again that would be a red flag when your network goes down and reboots when no one is using the admin page.
As for protecting "open" AP's at the mentioned coffee shops, McD's, etc. is simple.
All the manufacturers have to do is either make any firmware updates only flash able by manually enabling by a "button" pressed on the router and or updates only by cat cable no wireless updates allowed. My router can not be accessed via browser and you have to plug into a separate port to access the admin page to change router settings.
|posted by (2014-03-08 16:47:07)|
|well its not a surprise ...as everything good eventually comes to an end ...because of these low life gutter water rats...whats more can you say ...BUT ...people ...start to protect yourselves on a higher level and and at a pace to keep yourselves at least 2 steps ahead ... if that's even possible..anyways ...FFFFFFFFF##CCCCCCKING a..holes..|
|posted by (2014-03-09 11:34:11)|
|its really goood|
|thanks for the read and the titilating articles as always >|
|posted by (2014-03-11 14:02:33)|
to go for
|scary because this would imply a firmware virus affecting the wifi router itself. who knows where that can go. almost as interesting as computers that can talk to one another at ultrasound frequency via speakers and mics||
Most Popular Stories