By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    Malware Reigned Supreme In 2012
    12 months ago
    BEWARE THE THINGBOT!
    12 months ago
    Is your PC a part of botnet? Check it!
    12 months ago
    Latest News
    Beware of scammers! Dangerous apps in the App Store
    7 hours ago
    How To Limit Login Attempts on WordPress (+ Should You?)
    1 day ago
    Wordfence Intelligence Weekly WordPress Vulnerability Report (September 18, 2023 to September 24, 2023)
    1 day ago
    Two privilege escalation vulnerability in Simple Membership Plugin
    2 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    The creator of malware has infected her own computer
    12 months ago
    Windows 11 build 25163 out with new Taskbar Overflow feature
    12 months ago
    How to fix Microsoft Store not working on Windows 11
    12 months ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    8 months ago
    Now you can speed up any video in your browser
    8 months ago
    How to restore access to a file after EFS or view it on another computer?
    8 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    9 months ago
  • How To
    How ToShow More
    Cloudflare now uses post-quantum cryptography to talk to your origin server
    Cloudflare now uses post-quantum cryptography to talk to your origin server
    10 hours ago
    Privacy-preserving measurement and machine learning
    Privacy-preserving measurement and machine learning
    10 hours ago
    Encrypted Client Hello – the last puzzle piece to privacy
    Encrypted Client Hello – the last puzzle piece to privacy
    10 hours ago
    Reminder: Enable two-factor authentication wherever you have it. This business
    13 hours ago
    ​​Know exactly when your data is transferred to GoogleIn a world where our data is permanent
    13 hours ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    How to hide a file or folder on an Android device?
    12 months ago
    Image instead of Ethereum cryptocurrency
    12 months ago
    How to install Split APKs?
    12 months ago
    Latest News
    How to enable extensions for Google Bard AI
    8 hours ago
    Window 11 Copilot: 10 Best tips and tricks
    15 hours ago
    How to create AI images with Cocreator on Paint for Windows 11
    2 days ago
    How to install September 2023 update with 23H2 features for Windows 11
    3 days ago
  • Glossary
  • My Bookmarks
Reading: Wi-Fi hacking in recycled printers, computers and smart-home equipment
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
How To

Wi-Fi hacking in recycled printers, computers and smart-home equipment

Tom Grant
Last updated: 9 August
Tom Grant 2 months ago
Share
7 Min Read

When you throw away or sell an old computer or phone, you probably remember to delete photos, messages and other personal stuff. But there’s another kind of personal data that (almost) no one thinks about — and it needs to be erased not only from phones, but also from watches, printers and other smart devices — even your fridge. These are the settings for connecting to your Wi-Fi network.

Contents
The danger of leaky Wi-Fi accessHow Wi-Fi settings get stolenHow to guard against Wi-Fi leaks

The danger of leaky Wi-Fi access

Accessing someone else’s Wi-Fi network has commercial value. The simplest and most innocent (albeit naughty) form is using a neighbor’s connection. Far less innocent is data theft: in a home or office network, devices usually trust each other, so connecting to someone else’s Wi-Fi makes it easy to steal photos and documents from other network devices.

Even worse is when a Wi-Fi network is infiltrated for illegal activity, such as spamming or DDoS attacks. Exploiting a discovered Wi-Fi network just once, an attacker can hack a device on it (the router itself, home network-attached storage (NAS), a video surveillance camera, or any other easily hackable devices) — and then use it as a proxy server, without further recourse to Wi-Fi “services”. Such proxies operating from home networks are in steady demand from cybercriminals. Of course, the owner of the hacked device bears the brunt: their internet is slower; their IP address lands in various denylists; and, in rare cases, they might get blocked by the ISP or even get a police visit.

As for printers, cameras and other devices on an office network, their Wi-Fi settings can be used to attack the company in question. This attack vector is great for hackers, because in many companies cybersecurity is set up to protect against threats from the internet, while office devices — especially printers — are paid little attention. By connecting to the Wi-Fi network, attackers can easily carry out data theft and/or ransomware attacks.

How Wi-Fi settings get stolen

Most devices store Wi-Fi network information in unprotected form, making it child’s play to retrieve it from a discarded or sold-on gadget. It’s also not hard to find out who previously owned it:

  • If you sold it, the buyer knows it came from you;
  • If you decided to recycle the device, it’s possible you left your contact details when turning it in;
  • If you threw it away, most likely it was somewhere very close to where you used the device.

A bad factory reset also leaves behind many clues: the device name often points to the owner (Alex’s iPhone 8), and the Wi-Fi network name — to their address or employer (TheBensonsHouse, Volcano_Coffee_staff).

Such pointers make your Wi-Fi network easy to locate, and the password for it is right there in the device memory. For added credibility, attackers can connect to your network by spoofing the MAC address of the discarded device.

How to guard against Wi-Fi leaks

Reset and wipe. The most obvious security measure is to wipe the settings from all devices before parting with them. For laptops and computers, it’s recommended to physically format the drive; for other equipment, we advise a full factory reset with deletion of all data. After resetting, go to the network settings and make sure that everything’s really gone — then do another reset to make doubly sure. Unfortunately, the quality of factory resets varies depending on the device and the manufacturer, and there’s no cast-iron guarantee that a reset really does delete everything. For example, Canon recently reported an issue in 200 printer models in which the reset failed to clear the Wi-Fi settings. Canon’s advisory explains that a double reset is required, but for many other devices there’s simply no reliable way to clear the network settings.

Changing the Wi-Fi settings. This method is fiddly, but reliable and not too difficult technically. After getting rid of a device, change your Wi-Fi network password and update the settings on all your other devices. The fewer devices you have, the less trouble, of course. Always use strong, long passwords. And when you change one, generate a password randomly rather than just adding a number or letter at the end. Kaspersky Password Manager, included in a Kaspersky Premium subscription, will help you do this. In the Wi-Fi settings, select WPA2 or WPA3 encryption.

Strict access control. Every Wi-Fi-connected device has its own network access rights. For office and well-configured home networks, managing Wi-Fi access rights at the device level will help — your Wi-Fi router must support these settings. Configure your router so that any unknown or newly connected device is completely isolated and prohibited from accessing the internet or any device on your home network until you explicitly allow it to do so. When discarding or selling a device, be sure to isolate it in the router settings — not just remove it from the list. Then, even if attackers try to connect to the router through stolen credentials, no access will be granted.

A simple option for Wi-Fi access control. For those who find the previous method a bit too complicated, we recommend our smart home security guide, which takes a detailed look at how to properly configure home Wi-Fi and segment it for different categories of devices: computers, smartphones, smart home gadgets, and guest devices. To protect your home Wi-Fi from outsiders, we recommend the Devices on My Network feature in Kaspersky Premium. At first launch, the feature automatically maps your home network and identifies the name and type of each device, after which it continuously monitors the network for the appearance of “strangers” and warns you if a new unknown device pops up. If something in the list looks out of place, you can investigate and take action: from changing your Wi-Fi password to disabling unknown devices. And Kaspersky Premium will guide you through the process.


Source: kaspersky.com

Translate this article

TAGGED: Encryption, Proxy server, RC4, Security, Software, SQL injection, Targeted Attack, Threat, Tips
Tom Grant August 9, 2023 August 9, 2023
Share This Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

Cloudflare now uses post-quantum cryptography to talk to your origin server
Cloudflare now uses post-quantum cryptography to talk to your origin server
Apps 10 hours ago
Privacy-preserving measurement and machine learning
Privacy-preserving measurement and machine learning
Apps 10 hours ago
Encrypted Client Hello – the last puzzle piece to privacy
Encrypted Client Hello – the last puzzle piece to privacy
Apps 10 hours ago
Beware of scammers! Dangerous apps in the App Store
Threats 10 hours ago
How to enable extensions for Google Bard AI
News 11 hours ago

You Might Also Like

Cloudflare now uses post-quantum cryptography to talk to your origin server
Apps

Cloudflare now uses post-quantum cryptography to talk to your origin server

10 hours ago
Privacy-preserving measurement and machine learning
Apps

Privacy-preserving measurement and machine learning

10 hours ago
Encrypted Client Hello – the last puzzle piece to privacy
Apps

Encrypted Client Hello – the last puzzle piece to privacy

10 hours ago
How To

Reminder: Enable two-factor authentication wherever you have it. This business

13 hours ago
Show More

Related stories

How to upgrade to Windows 11 23H2 with Installation Assistant
How to install September 2023 update with 23H2 features for Windows 11
Critical Vulnerability in Forminator Plugin
How to get the latest Windows 11 innovations
How to blur image background in Photos for Windows 11
How to download official Windows 11 23H2 ISO file
Previous Next

10 New Stories

Reminder: Enable two-factor authentication wherever you have it. This business
​​Know exactly when your data is transferred to GoogleIn a world where our data is permanent
​​Fake correspondence with the iPhone interfaceIn a world where digital communication is
​​Let's find out who is watching your Instagram stories from a fake Have you ever wondered
Window 11 Copilot: 10 Best tips and tricks
How To Limit Login Attempts on WordPress (+ Should You?)
Previous Next
Hot News
Cloudflare now uses post-quantum cryptography to talk to your origin server
Privacy-preserving measurement and machine learning
Encrypted Client Hello – the last puzzle piece to privacy
Beware of scammers! Dangerous apps in the App Store
How to enable extensions for Google Bard AI
10alert.com10alert.com
Follow US
© 10 Alert Network. All Rights Reserved.
  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?