The past few days there's been a lot of buzz about a virus called Chameleon with spreads like common cold, between Wireless Access Points . Chameleon is the product of the University of Liverpool’s School of Computer Science and Electrical Engineering and Electronics and shows for the first time that WiFi networks can be infected with a virus that moves through the air, jumping from access point to access point.
WiFi access points have long been known to be potentially weak spots onto networks, often left unprotected by passwords or encryption, or still using the manufacturer’s or telecoms operator’s default security codes. But up until now, there hasn’t been a virus that could attack a WiFi network.
Chameleon behaves just as a disease would in a viral outbreak, moving faster through cities with dense populations, where access points (and humans) are closer together. The computer scientists simulated its outbreak in Belfast and London and found that in the higher density of London, the connectivity between devices was a more important factor than how susceptible the access points were.
The malware was also able to avoid detection and find the other visible WiFi access points from its current location that were least protected by encryption and passwords.
It propagates in the following sequence:
- It Establish a list of susceptible APs within the range
- Bypass any encryption Security on the targeted AP
- Bypass the administrative interface on the targeted AP
- Identify and Store AP System Settings
- Replace the AP firmware on with the virus-loaded firmware.
- Import the victim original AP System Settings on newly loaded firmware
- Let's Propagate! Back to Step one to next Target.