Most people assume the Pixie Dust threat, a vulnerability in the Wi-fi Protected Setup (WPS) that allows attackers onto a wireless network, is long dead. After all, cybersecurity pros have been aware of Pixie Dust since its creation in 2014, and taken active steps to prevent it. However, new research from software supply-chain security company NetRise suggests that, like the monster in the last reel of a horror movie, Pixie Dust refuses to stay down. Craig Heffner, a senior staff engineer at NetRise, expected that everyone would have patched an ancient cybersecurity vulnerability within wi-fi products that allows bad actors onto a network. But after an email from a hobbyist who found five out of 11 routers were successfully compromised by a Pixie Dust attempt, Heffner’s team took a closer look. In an email, Heffner told IT Brew that while his team is not ready to reveal the full list of vendors that are vulnerable to the Pixie Dust WPS exploit, they were able to share that TP-Link (a provider for networking equipment and smart home devices) accounted for almost half of the affected devices. A recap of what the ole Pixie Dust attack looks like.—CN |