Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Security Wireless Networking Networking

Scientists Demonstrate Virus That Spreads Across Wi-Fi Access Points 68

An anonymous reader writes "Researchers at the University of Liverpool have shown for the first time that WiFi networks can be infected with a virus that can move through densely populated areas as efficiently as the common cold spreads between humans. The team designed and simulated an attack by a virus, called 'Chameleon,' that not only could spread quickly between homes and businesses, but avoided detection and identified the points at which WiFi access is least protected by encryption and passwords. The research appears in EURASIP Journal on Information Security." The technical details are explained in the journal article.
This discussion has been archived. No new comments can be posted.

Scientists Demonstrate Virus That Spreads Across Wi-Fi Access Points

Comments Filter:
  • by khasim ( 1285 ) <> on Tuesday February 25, 2014 @11:30PM (#46342183)

    My problems with TFA are:

    1. Are they being paid by the word because they're throwing massive amounts of bullshit into it.


    A new form of compromised AP attack has been demonstrated and analysed in [4], called the 'Chameleon' attack, perpetrated by the Chameleon virus.

    That would be a "worm". Not a "virus". And a worm that attacks WiFi routers is NOT new.

  • by Anonymous Coward on Wednesday February 26, 2014 @12:00AM (#46342335)

    The article states chameleon attacks weakly protected acess points. If it finds a hardened one, like WAP, it moves on. It is a worm, not a virus, but the authors couldn't compare it to human contageon that way. I count myself lucky I never cought a worm. Virus, yes.

  • by khasim ( 1285 ) <> on Wednesday February 26, 2014 @12:20AM (#46342437)

    Worms hop from system to system without the need for any human interaction. They exploit vulnerabilities in services listening on ports. Worms need a network.

    A virus infects other files with copies of itself. But an uninfected machine still needs someone to run one of those files on the uninfected machine to infect the uninfected machine.

    Viruses are a lot less common now. Mostly you see trojans and worms and "blended" threats that are a mix of trojans and worms.

Experience varies directly with equipment ruined.