Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infection through home network, is it possible?


  • Please log in to reply
3 replies to this topic

#1 myym

myym

  • Members
  • 102 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Denmark
  • Local time:11:05 PM

Posted 26 February 2014 - 06:52 AM

I was wondering if its possible a pc get infected through a router when more than two pcs are connected. In case the first one is infected, will it spread it self to other pcs in that network?



BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:05 PM

Posted 26 February 2014 - 07:39 AM

Routers can be compromised if they have a weak or default password which attackers can easily guess or break using a dictionary attack or brute force attack. Malware which can modify routers are rare and may require the router to be a specific make, model and firmware revision. The most common was the DNSChanger Trojan which compromised the router's weak default password using brute-force attacks. The Trojan then changed the router's DNS table to malicious DNS servers...redirecting Domain Name resolutions to unsolicited, illegal and malicious sites the attacker wanted victims to access.

...Some DNS changer Trojans can alter routers' DNS settings via brute-force attacks. As a result, all systems connected to the "infected" router also become infected. Some DNS changer Trojans can also be used to set up rogue Dynamic Host Configuration Protocol (DHCP) servers on certain networks, which can have the same effect.

How DNS Changer Trojans Direct Users to Threats
Millions Of Home Routers Vulnerable To Web Hack
Malware Silently Alters Wireless Router Settings

Some routers have known vulnerabilities which can be exploited to open them up to attacks without needing to know the proper password. There have been various reports of vulnerabilities and attacks against hardware devices such as routers and data storage. For example, Ars Technica reported that ASUS routers and any storage devices attached to them may be exposed to anyone online without the need of login credentials if users have taken advantage of remote access features built into the routers. Linksys routers have been reported to be vulnerable to a simple exploit that could give an attacker remote access to the router.Related ResourcesBest Practice:
1. Keep up to date with all security information related to your router.
2. Always reset your default router password with a strong password?.

Consult these links to find out the default username and password for your router, and write down that information so it is available when doing the reset:These are general instructions for how to reset a router:
  • Unplug or turn off your DSL/cable modem.
  • Locate the router's reset button.
  • Press, and hold, the Reset button down for 30 seconds.
  • Wait for the Power, WLAN and Internet light to turn on (On the router).
  • Plug in or turn on your modem (if it is separate from the router).
  • Open your web browser to see if you have an Internet connection.
  • If you don't have an Internet connection you may need to restart your computer.
For more specific information on your particular model, check the owner's manual. If you do not have a manual, look for one on the vendor's web site which you can download and keep for future reference.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 myym

myym
  • Topic Starter

  • Members
  • 102 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Denmark
  • Local time:11:05 PM

Posted 26 February 2014 - 08:29 AM

Thank you for the info, I'll read it through and use the recommendations.



#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:05 PM

Posted 26 February 2014 - 09:13 AM

You're welcome.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users