The researchers found the virus was able to avoid detection and identify the points at which WiFi access is least protected by encryption and passwords
Researchers at the University of Liverpool have shown for the first time that WiFi networks can be infected with a virus that can move through densely populated areas as efficiently as the common cold spreads between humans.
The team designed and simulated an attack by a virus, called Chameleon, and found that not only could it spread quickly between homes and businesses, but it was able to avoid detection and identify the points at which WiFi access is least protected by encryption and passwords.
Researchers from the University’s School of Electrical Engineering, Electronics and Computer Science, simulated an attack on Belfast and London in a laboratory setting, and found that Chameleon behaved like an airborne virus, travelling across the WiFi network via Access Points (APs) that connect households and businesses to WiFi networks.
Alan Marshall, Professor of Network Security at the University, said: “When Chameleon attacked an AP it didn’t affect how it worked, but was able to collect and report the credentials of all other WiFi users who connected to it. The virus then sought out other WiFi APs that it could connect to and infect.”
Chameleon was able to avoid detection as current virus detection systems look for viruses that are present on the internet or computers, but Chameleon is only ever present in the WiFi network. Whilst many APs are sufficiently encrypted and password protected, the virus simply moved on to find those which weren’t strongly protected including open access WiFi points common in locations such as coffee shops and airports.
Professor Marshall continued said: “WiFi connections are increasingly a target for computer hackers because of well-documented security vulnerabilities, which make it difficult to detect and defend against a virus.
“It was assumed, however, that it wasn’t possible to develop a virus that could attack WiFi networks but we demonstrated that this is possible and that it can spread quickly. We are now able to use the data generated from this study to develop a new technique to identify when an attack is likely.”
The research is published in EURASIP Journal on Information Security.
Instead of infecting router’s (wifi) it’s is possible to make router’s with antivirus in it?
cuz this is not only news for IT security but to hackers and developers and others.
The virus Chamaleon, when it’s said
(it was able to avoid detection and identify the points at which WiFi access is least protected by encryption and passwords.)
I know that spread easy on unsecure wifi or wep,
but what about wpa, wpa2?
You must be logged in to post a comment.
All recent news
Virtual events and activities to take part in this week: 6 – 12 April 2020
Support for students in University-owned and private accommodation
New online module – Supporting PGR Student Mental Health for Supervisors
‘Project ARES’ launched to help COVID-19 front line responders
COVID-19 lockdown: “The home remains the most dangerous place for women (and children)”
"You can't stay at home, you can't wash your hands - so what are you supposed to do in a global pandemic?"
#Migration politics expert, Dr @gemmakristina on the plight of #refugees during #COVID19
Informed insight on the latest #coronavirus news with #livunitoday (#livunicovid)
Must Read article by @MonashGFV Lead Researcher & @MonashCrim Professor Sandra Walklate on the COVID-19 lockdown in the UK & why the home remains the most dangerous place for women & children https://news.liverpool.ac.uk/2020/04/06/covid-19-lockdown-home-remains-most-dangerous-place-women-children/ via @livuninews @LivUniSLSJ #DFV #Covid19 #VAW
Our additive manufacturing expert @DrKateBlack spoke to @snellyradio this morning about how @livuni engineers are using #3dprinting & laser cutting technologies to produce protective visors for local #NHS hospital staff. Listen>> from 2hr12min https://bbc.in/3caaXsv