Hackers target home Wi-Fi routers to steal data

64% of users have Wi-Fi routers in their household, but one in six do nothing to protect them.
64% of users have Wi-Fi routers in their household, but one in six do nothing to protect them.

Recently, a group of hackers created a new tactic for involving home routers in phishing attacks. This is incredibly worrying to cybersecurity experts, as 64% of users have Wi-Fi routers in their household, and 1 in 6 do nothing to protect them.

The attackers were hacking poorly protected routers and changing their settings. Once that was done, they could redirect users to a fake web page that displayed a message, purportedly from the World Health Organization, telling users to download an application that offers information about COVID-19. The application would then work as an info stealer and upload the stolen data to hackers’ servers.

“This attack affected almost 1,200 users who didn’t protect their home internet enough. According to our research, many users do nothing to protect their smart devices, so the situation might repeat itself in the future if users’ habits don’t change,” cybersecurity expert Daniel Markuson, NordVPN, comments. 

What are the dangers of Wi-Fi router hacking?
  • Unwanted users. While this does not necessarily put users’ privacy in danger, it could be rather annoying for many people and reduce the connection speed when somebody unwanted uses the network. It becomes even more worrying if the unwanted users decide to do something illegal, like shopping on the dark web or streaming pirated content.
  • Spying on internet traffic. A Wi-Fi router usually provides internet connection to all the smart devices in a household, including phones, laptops, smart TVs, and speakers. So, if a router gets hacked, it gives access to all the traffic on the user’s network from any device connected to it, and an attacker can see everything you are doing online (from shopping to entering your bank credentials).
  • Taking control of the user’s internet activity. In aman-in-the-middle attack, a cybercriminal places their device between a victim’s device and the Wi-Fi router. This allows hackers to secretly control the user’s traffic, potentially redirecting him or her to a malicious site that fools users into entering their credentials or banking details.
  • Redirecting to malicious and phishy websites. ​In order to redirect a user, attackers can perform DNS hijacking. It is a type of cyber attack when the router settings are changed to redirect users to websites that trick them into giving away personal information or malicious websites that download malware onto their device.
What can be done to protect home Wi-Fi networks?

“When it comes to hacking computers or phones, the dangers seem to be clear to most of the users. However, Wi-Fi routers don’t store any information, so users pay little attention to protecting them. And that is why they become targets for hackers more and more often,” Markuson says.

The least you can do to protect your home router is to change your default router password. After that, you can turn off SSID (Wi-Fi network name) broadcasts. If you hide your SSID, the name of your home Wi-Fi won’t appear in the list when someone tries to connect. Instead, they’ll have to manually connect by typing in your home Wi-Fi name and password. This way, a potential intruder will have to know the exact name of your home Wi-Fi as well as the password.

Lastly, install a VPN on your router. A VPN will encrypt the traffic on every device connected to your home Wi-Fi. It scrambles all of your online data, rendering it complete gibberish to hackers trying to intercept your network.

READ MORE:

About NordVPN

NordVPN is the world’s most advanced VPN service provider used by over 14 million internet users worldwide. NordVPN provides double VPN encryption, malware blocking, and Onion Over VPN. The product is very user-friendly, offers one of the best prices on the market, has over 5,000 servers in 60 countries worldwide, and is P2P-friendly. One of the key features of NordVPN is the zero-log policy.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

How smart labels are transforming supply chains

Sharath Muddaiah • 27th January 2025

As e-commerce continues to rise globally, the impact of just-in-time manufacturing and rising consumer expectations mean the need for real-time visibility has never been greater. Smart labels directly address this demand, offering solutions to long-standing challenges like shipment delays, theft, and the lack of traceability. With the smart label market projected to grow from $14.1...

The rise of loyalty apps

Sue Azari • 17th January 2025

Increased choice and a consumer more price sensitive than ever before, has made customers far more likely to shop around for the best deals. Price is now the number one factor in brand consideration. In an effort to bag a bargain, loyalty programs have become increasingly popular with consumers, with nine out of ten in...

Rocket launch challenges Elon Musk’s space dominance

Professor Sultan Mahmud • 16th January 2025

Amazon founder Jeff Bezos’s space company has blasted its first rocket into orbit in a bid to challenge the dominance of Elon Musk’s SpaceX. The New Glenn rocket launched from Cape Canaveral Space Force Station in Florida at 02:02 local time (07:02 GMT). It firmly pits the world’s two richest men against each other in...

Giesecke+Devrient launches new Smart Label at CES 2025

Giesecke Devrient • 06th January 2025

G+D has today launched the G+D Smart Label, its innovative tracking solution that transforms any package into an IoT device. Ultra-thin and only slightly larger than a credit card, the new Smart Label proposition has been jointly developed by G+D in conjunction with its hardware partner, Sensos to enable cost-effective, accurate location tracking for a...

Choose an AI solution to transform beyond technology

Kit Cox • 09th December 2024

The first step is knowing exactly what your business wants to achieve with AI; think faster, smarter and more efficient. Once you know what you are working towards, you can start looking for a solution that can help you make it a reality. AI integration can feel like a daunting task at the beginning, so...

A Roadmap to Security and Privacy Compliance

John Lynch Director of Kiteworks • 04th December 2024

Only by understanding the current regulatory environment and implementing robust data protection measures, can organisations enhance their security posture, ensure compliance, and build resilience against the latest cyber threats. This article provides a comprehensive roadmap of how to do it.

Data-Sharing Done Right: Finding the Best Business Approach

Bart Koek • 20th November 2024

To ensure data is not only available, but also accessible to those that need it, businesses recognise that it is vital to focus on collecting, sorting and governing all the data in their organisation. But what happens when data also needs to be accessed and shared across the business? That is where organisations discover a...