If you haven’t changed the default password on your home router, do so now.That’s what researchers at Symantec and Indiana University are saying, after publishing the results of tests that show how attackers could take over your home router using malicious JavaScript code.For the attack to work, the bad guys would need a couple of things to go their way. First, the victim would have to visit a malicious website that served up the JavaScript. Second, the victim’s router would still have to use the default password that it’s preconfigured with out of the box.In tests, the researchers were able to do things like change firmware and redirect a D-Link Systems DI-524 wireless router to look up websites from a DNS server of their choosing. They describe these attacks in a paper, authored by Sid Stamm and Markus Jakobsson of Indiana University, and Symantec’s Zulfikar Ramzan. “By visiting a malicious Web page, a person can inadvertently open up his router for attack,” the researchers write. “A Web site can attack home routers from the inside and mount sophisticated … attacks that may result in denial of service, malware infection, or identity theft.”Once the router has been compromised, victims can be redirected to fraudulent websites, the researchers say. So instead of downloading legitimate Microsoft software updates, for example, they could be tricked into downloading malware. Instead of online banking, they could be giving up sensitive information to phishers. At the heart of the problem is the fact that consumer routers ship with simple, well-known default passwords like “admin,” which could be exploited by attackers.“Owners of home routers who set a moderately secure password—one that is non-default and non-trivial to guess—are immune to router manipulation via JavaScript,” the paper states.The researchers blame router makers for shipping products with “poorly secure default settings.”Vendors like D-Link and Cisco Systems are aware of the problem. “It’s a concern to us,” said Karen Sohl, a spokeswoman with Cisco’s Linksys group. “We’ve shipped about 30 million routers, and we want those 30 million customers to understand why it’s so important to change [the default password].”Both Cisco and D-Link said they’ve taken steps to avoid this type of security problem. Over the past few years they’ve introduced step-by-step “wizard” software to configure their routers, and these products always suggest that the user come up with a unique password.The problem is that the routers still work if the password is left as default. And that’s not likely to change anytime soon, according to Michael Scott, D-Link’s technical media manager. Users wouldn’t buy routers that forced them to enter unique passwords, he said. “That would only result in returned products, and then they would buy one of our competitors’ products,” he said. -Robert McMillan, IDG News Service Related content news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability brandpost The advantages and risks of large language models in the cloud Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks Oct 03, 2023 5 mins Cloud Security news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Vulnerabilities news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe