Advice Request Attacked ! via WiFi

Please provide comments and solutions that are helpful to the author of this topic.

Victor M

Level 8
Thread author
Verified
Well-known
Oct 3, 2022
380
Hi Everyone,

Just got attacked via WiFi just a few weeks ago. Lasted a few weeks because I was being a dimwit.
The first clue I got was that I was unable to each F-Secure.com and nordvpn.com. I subscribe to Nord. And all their servers lie within their .com address space. So I can't even use my vpn.
I know that most man in the middle attacks (mitm) are local. But somehow I managed to forget that. Finally woke up and decided to nmap my network. Lo and behold there is a foreign machine in my LAN. I don't use WiFi, prefer Ethernet, but left both 2.4Ghz and 5Ghz turned on., I knew WiFi allows beyond the perimeter attacks and I had both WPA2 passwords set to long gibberish typing. But I forgot although the passwords are long ( > 20 chars ) they are still brute force-able, it just takes a long time. And looking around on the net, I found fern (Fern Pro | Penetration Testing) which does brute forcing and mitm. There are surely plenty more tools.

I live in a crowded city in a dense apartment complex. Now my WiFi is disabled at the router. No more blocked sites.
 
Last edited:

Kongo

Level 36
Verified
Top Poster
Well-known
Feb 25, 2017
2,505
Hi Everyone,

Just got attacked via WiFi just a few weeks ago. Lasted a few weeks because I was being a dimwit.
The first clue I got was that I was unable to each F-Secure.com and nordvpn.com. I subscribe to Nord. And all their servers lies within their .com address space. So I can't even use my vpn.
I know that most man in the middle attacks (mitm) are local. But somehow I managed to forget that. Finally woke up and decided to nmap my network. Lo and behold there is a foreign machine in my LAN. I don't use WiFi, prefer Ethernet, but left both 2.4Ghz and 5Ghz turned on., I knew WiFi allows beyond the perimeter attacks and I had both WPA2 passwords set to long gibberish typing. But I forgot although the passwords are long ( > 20 chars ) they are still brute force-able, it just takes a long time. And looking around on the net, I found fern (Fern Pro | Penetration Testing) which does brute forcing and mitm. There are surely plenty more.

I live in a crowded city in a dense apartment complex. Now my WiFi is disabled at the router.
Blacklist the device and change the Wifi password. I personally have a hardware Firewall that blocks newly connected devices from accessing the internet until I manually allow them. Maybe there is a similar option in your router.
 

Trident

Level 28
Verified
Top Poster
Well-known
Feb 7, 2023
1,739
Years ago I bought TP-Link wi-fi extender. The Norton firewall detected and alerted me to MITM attack. At that time I was experimenting with VPNs and noticed that whatever the VPN, it just gets turned on and instantly off again.

If you are experiencing such an issue, try resetting your router and then change the wi-fi password. You can also look at the list of devices frequently and blacklist any device that appears to not be yours, as @Kongo suggested.
 

Zero Knowledge

Level 20
Verified
Top Poster
Content Creator
Dec 2, 2016
841
I think the more plausible explanation is that your Wi-Fi router had a public exploit for your model of router, and someone was scanning for exploitable devices and found yours. Not to doubt your suspicions, but is there any reason someone would go to the effort of brute forcing a "20 long gibberish" length password just to get access to your Wi-Fi? If that's the case, you have a lot more to worry about because it would take a huge cluster of servers just to brute force such a long password and it would take many many years.

try resetting your router and then change the wi-fi password.
This. Also check for firmware updates from manufacturers site. Reset router>Upgrade firmware> Set new passwords.
 

MuzzMelbourne

Level 15
Verified
Top Poster
Well-known
Mar 13, 2022
599
...is there any reason someone would go to the effort of brute forcing a "20 long gibberish" length password just to get access to your Wi-Fi? If that's the case, you have a lot more to worry about because it would take a huge cluster of servers just to brute force such a long password and it would take many many years...

Interesting timing ZK, I just posted this...

pasaswordcrack.jpeg


I don't know about brute force Victor, I'd say it was a bloody amazing guess!
 

Victor M

Level 8
Thread author
Verified
Well-known
Oct 3, 2022
380
I think the more plausible explanation is that your Wi-Fi router had a public exploit
I thought about that - perhaps a gizmo device of some sort. I read recently that home routers are being attacked. I thought that it maybe a device because after changing the WPA2 passwords, I pinged that machine and still got a reply. Now maybe I didn't wait long enough. I decided to shut down the WiFi instead.
What were your primary reasons to keep the Wi-Fi enabled?
No reason. I forgot that even long passwords can be brute forced.

Now I haven't tried brute forcing my own router. I read somewhere on Wired ( I think ) that brute force is quite fast nowadays. And that you can setup a couple of fast machines on Amazon or Azure for little money.
 

Trident

Level 28
Verified
Top Poster
Well-known
Feb 7, 2023
1,739
Now I haven't tried brute forcing my own router. I read somewhere on Wired ( I think ) that brute force is quite fast nowadays. And that you can setup a couple of fast machines on Amazon or Azure for little money.
It sounds easy-peasy but it really isn’t. There is another explanation. Exploit is one. Another one I could think is neighbour/guest. Maybe they saw a sticker with the password and took a picture.

Brute forcing is really time consuming and still doesn’t guarantee that encryption will be cracked as well. Additional time and tools will be invested for the sake of getting your information. You can try temporarily use VPN (other than Nord maybe) which will add one more layer of encryption. Question is, are you able to use another VPN? If attackers really want to get your information they will perform additional steps that will ensure that you can’t communicate to VPN servers.
If your router is somehow compromised as you believe, then connections via ethernet aren’t safe either.

If the router is heavily compromised, think about purchasing another one and preferably one that gets constant firmware updates. If you have recently purchased this one, you may be able to return it. I would contact the router manufacturer immediately without further ado.
 
Last edited:
F

ForgottenSeer 97327

Some easy tips to make life a little harder for local network sniffers

1. Never login to the admin console of your router using WIFI

2. Use a long passphrase (at least 20 characters), change it when you think someone else is on your network

3. When your router has a wireless schedule (of parental control) simply disable Wifi at night
This reduces the time window for brute force attacks (I have disabled from 02.00 to 06.00)

4. Look for reboot schedule in your browser, set it do a daily reboot somewhere in the timeframe the Wifi is down,
I have set it at three 3.00 at night to reboot the router on a daily basis. This will always allow me to get in when needed.

5. Look for network partitioning or AP Isolation, when enabled it prevents to accessing resources of someone else in the network

6. Look for firewall and enable the firewall, when it got an option for SPI and/or DPI enable it

Most Android phones spoof their MAC-address, so when you want to allow every device individually, you will be quite busy when people use Android devices in your home.
AVG free and AVAST free have network inspector module, which warns you when someone logs into a guarded network.
 
Last edited by a moderator:

Kongo

Level 36
Verified
Top Poster
Well-known
Feb 25, 2017
2,505
I thought about that - perhaps a gizmo device of some sort. I read recently that home routers are being attacked. I thought that it maybe a device because after changing the WPA2 passwords, I pinged that machine and still got a reply. Now maybe I didn't wait long enough. I decided to shut down the WiFi instead.

No reason. I forgot that even long passwords can be brute forced.

Now I haven't tried brute forcing my own router. I read somewhere on Wired ( I think ) that brute force is quite fast nowadays. And that you can setup a couple of fast machines on Amazon or Azure for little money.
Does your router offer WPA3? Many iOT devices are still not supporting WPA3 but it's definitely the more secure option. Alternatively you can check wether your router offers WPA2 with protected management frames which at least gives a little security boost compared to WPA2 alone.
 
F

ForgottenSeer 97327

Agree, as addition to @Kongo and @Victor M
MAC-IP binding is a little better than MAC address filtering, because it blocks machines with spoofed addresses How to configure IP&MAC Binding with TP-Link Best approach is to put all your IOT devices on guest network (together with mobile phones) and put PC's on your home network with better encryption and advanced protections (like ARP spoofing protection) enabled.

In addition to the simple protections I already posted (which limit what an intruder can do and allows you to get back control). Home network security is like putting extra locks on your front door. It won't stop intruders getting in, but when you got more locks in place, the intruders will go to your neighbour's.
 
Last edited by a moderator:

Victor M

Level 8
Thread author
Verified
Well-known
Oct 3, 2022
380
The day before I enabled only the IoT WiFi, and gave it a 20+ char alphanumeric+symbol password. All other WiFis are switched off. There is only 1 Google Nest Home on that router which I bought a couple of days ago.

And yesterday afternoon, I noticed that the Gryphon router recorded 3 different machines doing pings on my network.

So it is either that Google Nest Home has some vulnerability, which allow the attacker to join the network, or my attackers have an exploit or device that bypasses WiFi passwords and let them join my network. If it is the latter then we are in deep #####.



Given
 
Last edited:

Zero Knowledge

Level 20
Verified
Top Poster
Content Creator
Dec 2, 2016
841
And yesterday afternoon, I noticed that the Gryphon router recorded 3 different machines doing pings on my network.
This is normal behaviour if it's your routers firewall detecting scans. Every router on the internet gets scanned every single day without fail for exploits.

I doubt the Google Nest has a exploit. Google is pretty good with security. They have probably one of the best security teams in the world if not the best.
 

Victor M

Level 8
Thread author
Verified
Well-known
Oct 3, 2022
380
No, this router is an internal router.

To make it worse, 3 machines joined this LAN and started pinging/nmaping and Gryphon was not able to quarantine them. Normally new machines that join the LAN gets quarantined and needs approval before it can use the network.
 
Last edited:
  • Like
Reactions: Trident

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top