[ale] Slightly OT - Verizon/McAfee scareware and testing Wireless Networks

Neal Rhodes neal at mnopltd.com
Mon Jan 21 09:52:28 EST 2019


I'm thinking the main router is older, and hasn't been updated.    So,
it might be that a truer statement is "It COULD BE compromised if
somebody bothered".  

However, it is scarier to make ominous statements and you have to pay to
MAYBE get more detail. 

I have to decide if this is a dragon I want to slay. 

Thanks, 

Neal

On Sun, 2019-01-20 at 23:45 -0500, DJ-Pfulio via Ale wrote:

> If the Linux kernels on those devices aren't newer than early 2018,
> there are remote exploits. A quick fingerprint of the router/AP packets
> should provide the kernel version, right?
> 
> There are some WiFi experts lurking, I'm certain.
> 
> The comcast exploit could be as simple as knowing the default,
> unable-to-be-changed, customer router password, if access to 10.1.10.1
> is possible. Spent over an hour trying to get a new password accepted
> with a bored Comcast Biz level-3 support guy a few years ago. It would
> work, until their nightly updates reset it. I haven't tested it again
> since they swapped out the old Biz equip for new. I use their device as
> an untrusted bridge.
> 
> This is why we always say to use a VPN on any wifi network. I don't even
> trust the wifi in my house.
> 
> On 1/20/19 11:11 PM, Alex Carver via Ale wrote:
> > On 2019-01-20 17:33, Neal Rhodes via Ale wrote:
> >> So, I don't know what possessed me to turn on the Verizon supplied
> >> security app on my Samsung phone.   But, I did. 
> >>
> >> And as soon as I walked into church, it lit up with a message about the
> >> wireless in the main hall, to wit:   "the security of this network has
> >> been compromised!"
> >>
> >> and it double dares me to ignore it.  And it repeats.    Now, I'm not
> >> personally iinvolved in this network; I recall it's maybe a business
> >> Comcast router feeding some Cisco wireless routers.   Doesn't seem like
> >> hardware that would get compromised. 
> >>
> >> Then I walk into the Sanctuary, and it switches wireless and complains
> >> again.   Now, the only wireless in the Sanctuary is a Linksys router
> >> which is connected to the Behringer X32 digital sound board.   It has NO
> >> connection to the internet at all, and only three devices know the
> >> password.  Those devices manage the sound.  uhhhh, how is it even
> >> possible this device/wireless has been compromised?
> >>
> >> Naturally, the Verizon app, powered by McAfee, won't tell me any details
> >> about these alleged compromises, but it does offer to sell me their
> >> enhanced WiFi protection.    I have to suspect this is scareware.  
> >>
> >> However, I'm wondering if there is some reasonably simple scan I can do
> >> with normal Android or Windows software to discern if there is any
> >> credence to this? 
> > 
> > I did a very rapid search for anyone complaining of the app coming up
> > with warnings like this.  Some of the complaints are on Verizon's
> > message boards where they say the app doesn't specifically figure out
> > how it's been compromised.  First thing I can think of is that the app
> > probes the network and determines whether you can connect to other
> > wireless devices on the same AP.  One of the possible AP configurations
> > for decent APs would be to isolate clients from each other so the app
> > may be sensitive to that as that could technically be a coffee-shop
> > attack vector.  The other thought is an AP using WEP or WPA instead of
> > WPA2 (ignoring KRACK).  Either way a lot of people seem to get the
> > message so it appears to be overly sensitive. 
> 
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> https://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists at
> http://mail.ale.org/mailman/listinfo


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mail.ale.org/pipermail/ale/attachments/20190121/5bed0b33/attachment.html>


More information about the Ale mailing list