They have created a proof-of-concept which can infect the entire wireless network instead of a single computer at a time, that replaces the firmware of the vulnerable Access Point (AP) with a virus-loaded version, and then propagates itself to the next victim on the WiFi network.
- It Establish a list of susceptible APs within the range
- Bypass any encryption Security on the targeted AP
- Bypass the administrative interface on the targeted AP
- Identify and Store AP System Settings
- Replace the AP firmware on with the virus-loaded firmware.
- Import the victim original AP System Settings on newly loaded firmware
- Let’s Propagate! Back to Step one to next Target.
![]() |
Laboratory setup |
“Hence, this attack is considered advanced and difficult to detect, as IDS rogue AP detection methods typically rely on a change in credentials, location or traffic levels.”
“WiFi connections are increasingly a target for computer hackers because of well-documented security vulnerabilities, which make it difficult to detect and defend against a virus,” says Marshall, Co-author of the research paper.
Republished from http://www.thehackernews.com/ article bySudhir K Bansal