{"id":12040,"date":"2018-05-04T04:46:56","date_gmt":"2018-05-04T04:46:56","guid":{"rendered":"http:\/\/www.lifeandnews.com\/articles\/?p=12040"},"modified":"2018-05-05T04:50:01","modified_gmt":"2018-05-05T04:50:01","slug":"russians-hack-home-internet-connections-heres-how-to-protect-yourself","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/russians-hack-home-internet-connections-heres-how-to-protect-yourself\/","title":{"rendered":"Russians hack home internet connections \u2013 here&#8217;s how to protect yourself"},"content":{"rendered":"<p><span><a href=\"https:\/\/theconversation.com\/profiles\/sandeep-nair-narayanan-471751\">Sandeep Nair Narayanan<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/university-of-maryland-baltimore-county-1667\">University of Maryland, Baltimore County<\/a><\/em>; <a href=\"https:\/\/theconversation.com\/profiles\/anupam-joshi-152246\">Anupam Joshi<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/university-of-maryland-baltimore-county-1667\">University of Maryland, Baltimore County<\/a><\/em>, and <a href=\"https:\/\/theconversation.com\/profiles\/sudip-mittal-471619\">Sudip Mittal<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/university-of-maryland-baltimore-county-1667\">University of Maryland, Baltimore County<\/a><\/em><\/span><\/p>\n<p>In late April, the top federal cybersecurity agency, US-CERT, announced that <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA18-106A\">Russian hackers had attacked internet-connected devices<\/a> throughout the U.S., including network routers in private homes. Most people set them up \u2013 or had their internet service provider set them up \u2013 and haven\u2019t thought much about them since. But it\u2019s the gateway to the internet for every device on your home network, including Wi-Fi connected ones. That makes it a potential target for anyone who wants to attack you, or, more likely, use your internet connection to attack someone else.<\/p>\n<p>As <a href=\"https:\/\/scholar.google.com\/citations?user=AhRNNeAAAAAJ&amp;hl=en\">graduate<\/a> <a href=\"https:\/\/scholar.google.com\/citations?user=l1szs7AAAAAJ&amp;hl=en\">students<\/a> and <a href=\"https:\/\/scholar.google.com\/citations?user=sJ7wlksAAAAJ&amp;hl=en\">faculty<\/a> doing research in cybersecurity, we know that hackers can take control of many routers, because manufacturers haven\u2019t set them up securely. Router administrative passwords often are preset at the factory to default values that are widely known, like \u201cadmin\u201d or \u201cpassword.\u201d By scanning the internet for older routers and guessing their passwords with <a href=\"http:\/\/www.openwall.com\/john\/\">specialized software<\/a>, hackers can take control of routers and other devices. Then they can install malicious programs or modify the existing software running the device.<\/p>\n<h2>Once an attacker takes control<\/h2>\n<p>There\u2019s a wide range of damage that a hacker can do once your router has been hijacked. Even though most people browse the web using securely encrypted communications, the directions themselves that let one computer connect to another are often not secure. When you want to connect to, say, <a href=\"https:\/\/www.theconversation.com\">theconversation.com<\/a>, your computer sends a request to a <a href=\"https:\/\/www.pcmag.com\/encyclopedia\/term\/41620\/dns\">domain name server<\/a> \u2013 a sort of internet traffic director \u2013 for instructions on how to connect to that website. That request goes to the router, which either responds directly or passes it to another domain name server outside your home. That request, and the response, are not usually encrypted. <\/p>\n<p>A hacker could take advantage of that and intercept your computer\u2019s request, to track the sites you visit. An attacker could also attempt to alter the reply, redirecting your computer to a fake website designed to steal your login information or even gain access to your financial data, online photos, videos, chats and browsing history.<\/p>\n<p>In addition, a hacker can use your router and other internet devices in your home to send out large amounts of nuisance internet traffic as part of what are called <a href=\"https:\/\/dyn.com\/blog\/dyn-analysis-summary-of-friday-october-21-attack\/\">distributed denial of service attacks<\/a>, like the <a href=\"http:\/\/www.nbcnewyork.com\/news\/local\/Major-Websites-Taken-Down-by-Internet-Attack-397905801.html\">October 2016 attack<\/a> that affected major internet sites like Quora, Twitter, Netflix and Visa. <\/p>\n<h2>Has your router been hacked?<\/h2>\n<p>An expert with complex technical tools may be able to discover whether your router has been hacked, but it\u2019s not something a regular person is likely to be able to figure out. Fortunately, you don\u2019t need to know that to kick out unauthorized users and make your network safe.<\/p>\n<p>The first step is to try to connect to your home router. If you bought the router, check the manual for the web address to enter into your browser and the default login and password information. If your internet provider supplied the router, contact their support department to find out what to do.<\/p>\n<p>If you\u2019re not able to login, then consider resetting your router \u2013 though be sure to check with your internet provider to find out any settings you\u2019ll need to configure to reconnect after you reset it. When your reset router restarts, connect to it and set a <a href=\"https:\/\/theconversation.com\/choose-better-passwords-with-the-help-of-science-82361\">strong administrative password<\/a>. The next step US-CERT suggests is to disable older types of internet communications, protocols like telnet, SNMP, TFTP and SMI that are often unencrypted or have other security flaws. Your router\u2019s manual or online instructions should detail how to do that.<\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/counter.theconversation.com\/content\/95907\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" \/>After securing your router, it\u2019s important to keep it protected. Hackers are very persistent and are always looking to find more flaws in routers and other systems. Hardware manufacturers know this and regularly issue updates to plug security holes. So you should check regularly and install any updates that come out. Some manufacturers have smartphone apps that can manage their routers, which can make updating easier, or even automate the process.<\/p>\n<p><span><a href=\"https:\/\/theconversation.com\/profiles\/sandeep-nair-narayanan-471751\">Sandeep Nair Narayanan<\/a>, Ph.D. candidate in Computer Science, <em><a href=\"http:\/\/theconversation.com\/institutions\/university-of-maryland-baltimore-county-1667\">University of Maryland, Baltimore County<\/a><\/em>; <a href=\"https:\/\/theconversation.com\/profiles\/anupam-joshi-152246\">Anupam Joshi<\/a>, Oros Family Professor and Chair, Department of Computer Science &#038; Electrical Engineering, <em><a href=\"http:\/\/theconversation.com\/institutions\/university-of-maryland-baltimore-county-1667\">University of Maryland, Baltimore County<\/a><\/em>, and <a href=\"https:\/\/theconversation.com\/profiles\/sudip-mittal-471619\">Sudip Mittal<\/a>, Ph.D. Candidate in Computer Science, <em><a href=\"http:\/\/theconversation.com\/institutions\/university-of-maryland-baltimore-county-1667\">University of Maryland, Baltimore County<\/a><\/em><\/span><\/p>\n<p>This article was originally published on <a href=\"http:\/\/theconversation.com\">The Conversation<\/a>. Read the <a href=\"https:\/\/theconversation.com\/russians-hack-home-internet-connections-heres-how-to-protect-yourself-95907\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sandeep Nair Narayanan, University of Maryland, Baltimore County; Anupam Joshi, University of Maryland, Baltimore County, and Sudip Mittal, University of Maryland, Baltimore County In late April, the top federal cybersecurity agency, US-CERT, announced that Russian hackers had attacked internet-connected devices throughout the U.S., including network routers in private homes. Most people set them up \u2013 [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":12041,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3410],"tags":[612,549,613,2197,4432,4431],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/12040"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=12040"}],"version-history":[{"count":1,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/12040\/revisions"}],"predecessor-version":[{"id":12042,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/12040\/revisions\/12042"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/12041"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=12040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=12040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=12040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}