{"id":61278,"date":"2023-01-30T14:25:10","date_gmt":"2023-01-30T06:25:10","guid":{"rendered":"https:\/\/version-2.com\/?p=61278"},"modified":"2024-09-13T16:31:48","modified_gmt":"2024-09-13T08:31:48","slug":"what-happens-when-your-router-is-hacked","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2023\/01\/what-happens-when-your-router-is-hacked\/","title":{"rendered":"What happens when your router is hacked?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"61278\" class=\"elementor elementor-61278\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"text-base leading-normal text-left text-h3 text-black\">Most people understand that routers can be hacked, but not everybody realizes just how damaging this kind of cyberattack can be. In this article, I will explain exactly how a hacker can target your router, what the consequences could be, and what you can do to protect yourself.<\/p>\n\n<div class=\"my-64 text-center\">\n<p class=\"text-nano leading-normal text-left text-center text-gray-600 my-8\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/engineering\/2023\/01\/Blog_thumbnail_2023_01_17_2.png\" width=\"1200\" height=\"675\" \/><\/p>\n\n<\/div>\n<div class=\"style_postContent__uJLGT text-black break-words\" data-content-type-blog=\"true\">\n<div class=\"Article_wrapper__YyQ2_\">\n<h2 id=\"Most users underestimate the risk\" class=\"text-h2 leading-none text-left\"><b>Most users underestimate the risk<\/b><\/h2>\n<p class=\"text-base leading-normal\">No one wants to be hacked, but it\u2019s easy to come up with excuses for not addressing router security issues \u2014 excuses like:<\/p>\n\n<ul class=\"list-disc ml-24\">\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">Hackers don\u2019t want to hack me (aka: \u201cI have nothing to hide\u201d or \u201cMy data isn\u2019t valuable to anyone\u201d).<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">It\u2019s too complicated to secure my router and configure it properly.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">I assume that it\u2019s secure by design (aka: \u201cI trust my ISP to secure it\u201d).<\/p>\n\n<\/div><\/li>\n<\/ul>\n<p class=\"text-base leading-normal\">Do these excuses look reasonable to you? Maybe, but the truth is that most hackers would be happy to attack your router if it\u2019s not properly protected, especially if they can do so quickly.<\/p>\n<p class=\"text-base leading-normal\">Securing your router is not technically complicated \u2013 you don\u2019t need an IT specialist to keep your router safe anymore than you need an automobile engineer to drive your car. Making sure your router is protected should be a standard part of internet use.<\/p>\n<p class=\"text-base leading-normal\">Finally, you should not trust your internet service provider (ISP) to keep you safe. More often than not, its security measures are inadequate.<\/p>\n\n<h2 id=\"Types of vulnerabilities\" class=\"text-h2 leading-none text-left\"><b>Types of vulnerabilities<\/b><\/h2>\n<p class=\"text-base leading-normal\">Routers are commonly attacked using five main methods. In all the cases, an attacker gets root access (also known as administrative access) and gains full control of the device. The following list begins with the most unlikely and challenging hacks and ends with most common methods, which are also the easiest for the hacker. Each method also comes with an example of the tools and exploits a hacker could use to carry them out.<\/p>\n<p class=\"text-base leading-normal\"><b>Physical (Hacking level: extremely difficult)<\/b><\/p>\n<p class=\"text-base leading-normal\">A physical attack requires the hacker to get physical access to your router. If they manage this, they can bypass security measures and get full administrator access. This process usually involves connecting the router to special hardware (in most cases, a serial console or JTAG).<\/p>\n<p class=\"text-base leading-normal\">While it may be a challenge for them to get close to your home router, hackers can use other ways to gain physical access to these devices. For example, they could target an outdoor wireless extender placed in the yard or a wireless router in a hotel that is used by guests.<\/p>\n\n<ul class=\"list-disc ml-24\">\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Example: <\/b>Almost any device with easy access to TTL or JTAG (for example, D-Link DIR-825AC) could be used to launch this hack. JTAG can also be used legitimately to unlock and customize a router.<\/p>\n\n<\/div><\/li>\n<\/ul>\n<p class=\"text-base leading-normal\"><b>Local authenticated (Hacking level: moderately difficult)<\/b><\/p>\n<p class=\"text-base leading-normal\">To perform a local authenticated attack, a hacker must connect to your LAN (local area network) or Wi-Fi. Usually this involves connecting a tiny device to a free network socket or cracking a weak wireless password.<\/p>\n<p class=\"text-base leading-normal\">The hacker must also know the default administrator\u2019s password (or be able to brute force it). Collections of default router passwords are available to hackers online as well as tools that allow them to brute force weak passwords. Infecting a local connected device, like a laptop or smartphone, could give the hacker the same level of access to your local network.<\/p>\n\n<ul class=\"list-disc ml-24\">\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Example: <\/b>The <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/full-disclosure.eu\/reports\/2020\/FDEU-CVE-2020-1FC5-telia-technicolor-tg389ac-vulnerability.html\" target=\"_blank\" rel=\"noopener noreferrer\">Telia Technicolor Samba symlink exploit<\/a>. This is also used by non-malicious technicians to jailbreak locked devices.<\/p>\n\n<\/div><\/li>\n<\/ul>\n<p class=\"text-base leading-normal\"><b>Local unauthenticated (Hacking level: challenging)<\/b><\/p>\n<p class=\"text-base leading-normal\">Like the local authenticated method, a local unauthenticated attack requires the hacker to connect to the LAN or Wi-Fi or to infect a local device. This time, however, the hacker does not need to know the administrator\u2019s password.<\/p>\n<p class=\"text-base leading-normal\">Usually, local unauthenticated attacks involve exploiting some software vulnerability in your router\u2019s firmware (for example, the buffer overflow in its web management function) or accessing misconfigured components (like a default telnet left without password protection).<\/p>\n\n<ul class=\"list-disc ml-24\">\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Example: <\/b>The <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/blog.mikrotik.com\/security\/winbox-vulnerability.html\" target=\"_blank\" rel=\"noopener noreferrer\">Mikrotik RouterOS vulnerability CVE-2018-14847<\/a> and the <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/full-disclosure.eu\/reports\/2019\/FDEU-CVE-2019-10222-telia-savitarna-backdoor.html#administrator-password-leak\" target=\"_blank\" rel=\"noopener noreferrer\">Telia ADB hardcoded \u201ctadmin\u201d superuser<\/a> method.<\/p>\n\n<\/div><\/li>\n<\/ul>\n<p class=\"text-base leading-normal\"><b>Remote authenticated (Hacking level: relatively easy)<\/b><\/p>\n<p class=\"text-base leading-normal\">Remote authenticated attacks are possible against certain routers via the internet, so the hacker doesn\u2019t need to be close to you or join your LAN. They still need to know some default credentials to bypass the service password, but they can also brute force it if necessary.<\/p>\n\n<ul class=\"list-disc ml-24\">\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Example: <\/b>The Huawei LANSwitch model with a default Web UI open to the internet. This exploit was resolved in January 2023 but still acts as a good example of a remote authenticated threat \u2014 albeit one that is no longer active.<\/p>\n\n<\/div><\/li>\n<\/ul>\n<p class=\"text-base leading-normal\"><b>Remote unauthenticated (Hacking level: very easy)<\/b><\/p>\n<p class=\"text-base leading-normal\">Remote unauthenticated attacks are the worst-case scenario. Remote unauthenticated attacks can occur if anyone can access the router from the internet, without needing an administrator\u2019s credentials.<\/p>\n<p class=\"text-base leading-normal\">Usually, if a router can be accessed in this way, it is the result of the device coming with bad default configuration, a hidden backdoor, or a vulnerability in the software. In some nightmare scenarios, a router may end up with all three of these issues.<\/p>\n<p class=\"text-base leading-normal\">A router with these problems can be quickly scanned and exploited by thousands of automated bots or commercial providers (Shodan, for example). It takes between a few minutes and a few hours for the first bot to reach the device once it\u2019s been connected to the internet. After scanning the router, a bot will be able identify the model and use the appropriate script to gain the access.<\/p>\n\n<ul class=\"list-disc ml-24\">\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Example: <\/b>Security flaws in multiple <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/cybernews.com\/security\/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices\/\" target=\"_blank\" rel=\"noopener noreferrer\">cheap routers sold on Amazon and Walmart<\/a>. While these two examples are particularly egregious, many other routers may have the same issues.<\/p>\n\n<\/div><\/li>\n<\/ul>\n<h2 id=\"What happens once you\u2019ve been hacked?\" class=\"text-h2 leading-none text-left\"><b>What happens once you\u2019ve been hacked?<\/b><\/h2>\n<p class=\"text-base leading-normal\">Your router has been hacked. What happens now? After gaining root access, the attacker\u2019s power over the device is unlimited. Here are some of the steps a hacker might take next:<\/p>\n\n<ul class=\"list-disc ml-24\">\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">Add a persistent backdoor to allow for remote device use or botnet inclusion.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">View your unencrypted traffic in plain text (using tcpdump, for example).<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">Carry out deep packet inspection (DPI) on any encrypted traffic.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">Redirect your traffic (for example, through DNS spoofing or by using iptables).<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">Launch social engineering attacks against you (for example, a hacker could redirect you to a fake website, pretending to be your online banking platform, where you might expose sensitive information).<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">Disconnect you from the internet and demand a ransom to restore access.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">Make your router a proxy for other criminals to perform criminal activities from your IP address (potentially leaving you to convince the police that you weren\u2019t the source of the criminal activity).<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">Hack your other devices (moving laterally) which were not accessible from the internet. If successful, this could allow the hacker to install ransomware or cryptominer malware on your other computers at home.<\/p>\n\n<\/div><\/li>\n<\/ul>\n<p class=\"text-base leading-normal\">Still think it\u2019s not worth your time to secure your router?<\/p>\n\n<h2 id=\"How to protect your router\" class=\"text-h2 leading-none text-left\"><b>How to protect your router<\/b><\/h2>\n<p class=\"text-base leading-normal\">If you think it\u2019s time to start protecting your router and the devices connected to it, take the following steps.<\/p>\n\n<ul class=\"list-disc ml-24\">\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">Understand that your data is valuable. Even if you are not a celebrity or a high-profile politician, it\u2019s still worth a hacker\u2019s time to attack your router. Always see yourself as a potential target. You don\u2019t have to be paranoid, but don\u2019t ignore the risks.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">Buy a user-friendly router that has good documentation and a clear user interface and that provides technical support and firmware updates. These routers may cost more, but security is a worthwhile investment.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">Do not trust your ISP. ISPs tend to lower maintenance costs by saving on security. If possible, avoid using the router provided by your ISP, or at least unlock and take full control of it (change the default password, disable remote management, remove backdoors, and enable a firewall).<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">If possible, use WPA3, and protect yourself with a non-dictionary-based password containing at least ten characters. Never use WEP or unencrypted Wi-FI.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\">Use a VPN on your local devices (laptops, phones, TVs) to encrypt traffic.<\/p>\n\n<\/div><\/li>\n<\/ul>\n<p class=\"text-base leading-normal\">You should now understand both the risks of an unsecured router and the actions you can take today to protect it. Stay safe!<\/p>\n\n<\/div>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"54571\" class=\"elementor elementor-54571\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Nord Security<\/strong><br \/>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Most people understand that routers can be hacked, but  [&hellip;]<\/p>\n","protected":false},"author":148637484,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1075,61],"tags":[974,1076],"class_list":["post-61278","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-year2023","category-press-release","tag-nord-security","tag-1076"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What happens when your router is hacked? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordsecurity.com\/blog\/what-happens-when-router-is-hacked\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What happens when your router is hacked? - Version 2\" \/>\n<meta property=\"og:description\" content=\"Most people understand that routers can be hacked, but [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordsecurity.com\/blog\/what-happens-when-router-is-hacked\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-30T06:25:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T08:31:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/engineering\/2023\/01\/Blog_thumbnail_2023_01_17_2.png\" \/>\n<meta name=\"author\" content=\"versionpan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"versionpan\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/what-happens-when-router-is-hacked#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/01\\\/what-happens-when-your-router-is-hacked\\\/\"},\"author\":{\"name\":\"versionpan\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\"},\"headline\":\"What happens when your router is hacked?\",\"datePublished\":\"2023-01-30T06:25:10+00:00\",\"dateModified\":\"2024-09-13T08:31:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/01\\\/what-happens-when-your-router-is-hacked\\\/\"},\"wordCount\":1354,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/what-happens-when-router-is-hacked#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/nordsec\\\/f_auto,c_limit,w_1200,q_auto\\\/v1\\\/nord-security-web\\\/blog\\\/categories\\\/engineering\\\/2023\\\/01\\\/Blog_thumbnail_2023_01_17_2.png\",\"keywords\":[\"Nord Security\",\"2023\"],\"articleSection\":[\"Nord Security\",\"2023\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/01\\\/what-happens-when-your-router-is-hacked\\\/\",\"url\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/what-happens-when-router-is-hacked\",\"name\":\"What happens when your router is hacked? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/what-happens-when-router-is-hacked#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/what-happens-when-router-is-hacked#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/nordsec\\\/f_auto,c_limit,w_1200,q_auto\\\/v1\\\/nord-security-web\\\/blog\\\/categories\\\/engineering\\\/2023\\\/01\\\/Blog_thumbnail_2023_01_17_2.png\",\"datePublished\":\"2023-01-30T06:25:10+00:00\",\"dateModified\":\"2024-09-13T08:31:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/what-happens-when-router-is-hacked#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/what-happens-when-router-is-hacked\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/what-happens-when-router-is-hacked#primaryimage\",\"url\":\"https:\\\/\\\/res.cloudinary.com\\\/nordsec\\\/f_auto,c_limit,w_1200,q_auto\\\/v1\\\/nord-security-web\\\/blog\\\/categories\\\/engineering\\\/2023\\\/01\\\/Blog_thumbnail_2023_01_17_2.png\",\"contentUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/nordsec\\\/f_auto,c_limit,w_1200,q_auto\\\/v1\\\/nord-security-web\\\/blog\\\/categories\\\/engineering\\\/2023\\\/01\\\/Blog_thumbnail_2023_01_17_2.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/what-happens-when-router-is-hacked#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What happens when your router is hacked?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\",\"name\":\"versionpan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"caption\":\"versionpan\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/versionpan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What happens when your router is hacked? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordsecurity.com\/blog\/what-happens-when-router-is-hacked","og_locale":"zh_HK","og_type":"article","og_title":"What happens when your router is hacked? - Version 2","og_description":"Most people understand that routers can be hacked, but [&hellip;]","og_url":"https:\/\/nordsecurity.com\/blog\/what-happens-when-router-is-hacked","og_site_name":"Version 2","article_published_time":"2023-01-30T06:25:10+00:00","article_modified_time":"2024-09-13T08:31:48+00:00","og_image":[{"url":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/engineering\/2023\/01\/Blog_thumbnail_2023_01_17_2.png","type":"","width":"","height":""}],"author":"versionpan","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"versionpan","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"8 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordsecurity.com\/blog\/what-happens-when-router-is-hacked#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/01\/what-happens-when-your-router-is-hacked\/"},"author":{"name":"versionpan","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8"},"headline":"What happens when your router is hacked?","datePublished":"2023-01-30T06:25:10+00:00","dateModified":"2024-09-13T08:31:48+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/01\/what-happens-when-your-router-is-hacked\/"},"wordCount":1354,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordsecurity.com\/blog\/what-happens-when-router-is-hacked#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/engineering\/2023\/01\/Blog_thumbnail_2023_01_17_2.png","keywords":["Nord Security","2023"],"articleSection":["Nord Security","2023","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/01\/what-happens-when-your-router-is-hacked\/","url":"https:\/\/nordsecurity.com\/blog\/what-happens-when-router-is-hacked","name":"What happens when your router is hacked? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordsecurity.com\/blog\/what-happens-when-router-is-hacked#primaryimage"},"image":{"@id":"https:\/\/nordsecurity.com\/blog\/what-happens-when-router-is-hacked#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/engineering\/2023\/01\/Blog_thumbnail_2023_01_17_2.png","datePublished":"2023-01-30T06:25:10+00:00","dateModified":"2024-09-13T08:31:48+00:00","breadcrumb":{"@id":"https:\/\/nordsecurity.com\/blog\/what-happens-when-router-is-hacked#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordsecurity.com\/blog\/what-happens-when-router-is-hacked"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordsecurity.com\/blog\/what-happens-when-router-is-hacked#primaryimage","url":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/engineering\/2023\/01\/Blog_thumbnail_2023_01_17_2.png","contentUrl":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/engineering\/2023\/01\/Blog_thumbnail_2023_01_17_2.png"},{"@type":"BreadcrumbList","@id":"https:\/\/nordsecurity.com\/blog\/what-happens-when-router-is-hacked#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"What happens when your router is hacked?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8","name":"versionpan","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","caption":"versionpan"},"url":"https:\/\/version-2.com\/zh\/author\/versionpan\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-fWm","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/61278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/148637484"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=61278"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/61278\/revisions"}],"predecessor-version":[{"id":61285,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/61278\/revisions\/61285"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=61278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=61278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=61278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}