Feeds

BT launches Home Hub backdoor investigation

Two million exposed?

Internet Security Threat Report 2014

BT's security pros are probing the alleged hole in its Home Hub firmware, which resarchers claim can gift hijackers with full admin rights to the wireless router.

The vulnerability was reported yesterday on the GNUCitizen blog. By luring one of the UK's two million Home Hub owners to a malicious website it's possible to steal their passwords, listen in on their VoIP calls, and redirect them to online scams, say Adrian Pastor and Petko Petkov.

BT sent us this statement on Tuesday afternoon:

We are aware of these claims and are actively investigating the alleged vulnerability. However, as part of a series of ongoing improvements, this week we began pushing out a new firmware update to Home Hub owners which further improves security in a number of areas.

Pastor and Petkov say the exploit is confirmed in the most recent version of BT's firmware.

The GNUCitizen researchers went ahead and published the vulnerability without waiting for BT to respond, complaining that the telco giant failed to respond to another hole they discovered last year. BT said: "We at BT remain committed to working with industry to ensure we protect our customers against security threats."

The Home Hub is built by Thompson, and its firmware is based on a tweaked version of the Linux kernel. ®

Internet Security Threat Report 2014

More from The Register

next story
Mighty Blighty broadbanders beg: Let us lay cable in BT's, er, ducts
Complain to Ofcom that telco has 'effective monopoly'
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?