- cross-posted to:
- hackernews@lemmy.smeargle.fans
- cross-posted to:
- hackernews@lemmy.smeargle.fans
During installation, the router sent several data packets to an Amazon server in the US. These packets contained the configured SSID name and password in clear text, as well as some identification tokens for this network within a broader database and an access token for a user session that could potentially enable a MITM attack.
Linksys has refused to acknowledge/respond to the issue.
You do know that enterprise doesn’t make you safer, right? Consumer gets hit by botnets, enterprise gets hit by higher level attacks.
I don’t get your point. This isn’t an attack, this is a cheap consumer company doing what they do best and stealing your personal information because $ and other crap. If this happened in enterprise they’d be in so much shit with laws. Cisco, juniper, Aruba, etc are not going to be shipping off your passwords because that liability is going to be a big problem.
Enterprise level stuff also charge top dollar and don’t need to sell your data to make more money.
If enterprise level stuff we’re doing this intentionally they’d be out of business. This would not fly with SOC and other security designations.
Additionally just because a consumer uses enterprise gear, that does not make them a larger target. I’m not Microsoft. No state attacker is going to want my worthless data.
It’ll make them a target of attacks targeting that class of gear.
Most threat actors are looking at who owns what IP space and checking the IPs of that, or what other public info they can find (website address etc). Not chasing after someone with a consumer internet IP. There is just not the same incentive.
They specifically didn’t say they’re using enterprise. Diy open source solutions such as a ddwrt router for example doesn’t exactly fit in the “consumer” nor the “enterprise” category.