Skip to main content

Secondhand routers may be a serious security concern

Security researchers have publicly revealed findings in a study that uncovered that more than half of the enterprise routers sold secondhand to online resellers, such as eBay, had not been factory reset and wiped of their data. This means the devices still contained sensitive company information from their previous owners when they were resold.

Researchers from the security firm ESET plan to showcase their study at the RSA security conference in San Francisco next week, but told Wired that they were able to uncover data of the enterprise organizations from the secondhand routers, including “network information, credentials, and other confidential data,” with no major effort.

A Wi-Fi router with an ethernet cable plugged in.
wlan antenna Getty Images

In particular, the researchers purchased 18 used routers from well-known brands including Cisco, Fortinet, and Juniper Networks. They ultimately discovered that nine of the devices were sold as is, and they offered easy access to all the router’s information. Meanwhile, five of the routers had been fully factory reset and wiped of all data. Two of the routers were encrypted, one was dead, and one was a mirror copy of another device, Wired noted.

The information ESET researchers were able to collect from the nine unprotected routers includes “credentials for the organization’s VPN, credentials for another secure network communication service, and hashed root administrator passwords.”

Eight of the unprotected routers included “router-to-router authentication keys” with “information about how the router connected to specific applications used by the previous owner.” Four routers included “credentials for connecting to the networks of other organizations, such as trusted partners, collaborators, or other third parties.” Three devices hosted details of how one could “connect as a third party to the previous owner’s network,” while two held customer data, according to the study.

ESET also noted that all nine unprotected routers included enough data for the researchers to figure out to which organizations they previously belonged.

The researchers noted how much of a security risk these routers being so easily accessible is because of the prevalence of cybercriminals and state-backed hackers. The routers can simply be purchased at a discount online because they are secondhand, and bad actors can potentially scan devices for valuable corporate information they can sell on the dark web and then simply resell the router again. The researchers said they hesitated to release their findings, but ultimately decided that awareness was the better option.

The ESET team told Wired they have done their diligence to contact and warn the prior owners of the nature of their routers, with some grateful for the update. Meanwhile, others appeared to ignore the warnings or not cooperate.

Fionna Agomuoh
Fionna Agomuoh is a technology journalist with over a decade of experience writing about various consumer electronics topics…
Update your Apple devices now to fix these dangerous exploits
A person using a laptop with a set of code seen on the display.

If you’re an Apple user -- whether you have a Mac, an iPhone, an iPad, or an Apple Watch -- you need to update your devices as soon as possible. That’s because Apple has discovered three actively exploited vulnerabilities that could cause your devices serious harm, and the patches are already out to fix them.

One of the bugs was found in Apple’s Security framework and would allow a malicious app to completely bypass a device’s signature validation. Another bug concerns the WebKit browser engine and could grant a threat actor the ability to run arbitrary code when a victim views a certain web page.

Read more
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more