During installation, the router sent several data packets to an Amazon server in the US. These packets contained the configured SSID name and password in clear text, as well as some identification tokens for this network within a broader database and an access token for a user session that could potentially enable a MITM attack.

Linksys has refused to acknowledge/respond to the issue.

  • 0x0
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    3
    ·
    4 months ago

    You do know that enterprise doesn’t make you safer, right? Consumer gets hit by botnets, enterprise gets hit by higher level attacks.

    • yeehaw@lemmy.ca
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      1
      ·
      4 months ago

      I don’t get your point. This isn’t an attack, this is a cheap consumer company doing what they do best and stealing your personal information because $ and other crap. If this happened in enterprise they’d be in so much shit with laws. Cisco, juniper, Aruba, etc are not going to be shipping off your passwords because that liability is going to be a big problem.

      Enterprise level stuff also charge top dollar and don’t need to sell your data to make more money.

      If enterprise level stuff we’re doing this intentionally they’d be out of business. This would not fly with SOC and other security designations.

      Additionally just because a consumer uses enterprise gear, that does not make them a larger target. I’m not Microsoft. No state attacker is going to want my worthless data.

      • 0x0
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        4 months ago

        Additionally just because a consumer uses enterprise gear, that does not make them a larger target.

        It’ll make them a target of attacks targeting that class of gear.

        • yeehaw@lemmy.ca
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          1
          ·
          4 months ago

          Most threat actors are looking at who owns what IP space and checking the IPs of that, or what other public info they can find (website address etc). Not chasing after someone with a consumer internet IP. There is just not the same incentive.

    • PenisWenisGenius@lemmynsfw.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      4 months ago

      They specifically didn’t say they’re using enterprise. Diy open source solutions such as a ddwrt router for example doesn’t exactly fit in the “consumer” nor the “enterprise” category.