Why it might be a good idea to use strong passphrases to secure internet routing devices. Because if you set it to the default password then what will happen is foreign and domestic adversaries will take advantage of your good will and fuck your shit up literally with a few keystrokes.
In late April, the top federal cybersecurity agency, US-CERT, announced that Russian hackers had attacked internet-connected devices throughout the U.S., including network routers in private homes. Most people set them up – or had their internet service provider set them up – and haven’t thought much about them since. But it’s the gateway to the internet for every device on your home network, including Wi-Fi connected ones. That makes it a potential target for anyone who wants to attack you, or, more likely, use your internet connection to attack someone else.
As graduate students and faculty doing research in cybersecurity, we know that hackers can take control of many routers, because manufacturers haven’t set them up securely. Router administrative passwords often are preset at the factory to default values that are widely known, like “admin” or “password.” By scanning the internet for older routers and guessing their passwords with specialized software, hackers can take control of routers and other devices. Then they can install malicious programs or modify the existing software running the device.
How To Know Whether Your Being Hacked By An Adversary
This is one method for knowing whether your being hacked by an adversary is when you hear radio static human feedback from your wireless routing device. Because as I have come to realize it myself is that anything that operates at 2.4 GHz (UHF) and 5 GHz (SHF) from a wireless routing device can be intercepted using a software defined radio.