{"id":48774,"date":"2023-08-09T05:10:17","date_gmt":"2023-08-09T09:10:17","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=48774"},"modified":"2023-08-09T05:10:17","modified_gmt":"2023-08-09T09:10:17","slug":"wifi-protection-for-gadget-disposal","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/wifi-protection-for-gadget-disposal\/48774\/","title":{"rendered":"Disposing of a gadget? Remember to wipe this"},"content":{"rendered":"<p>When you throw away or sell an old computer or phone, you probably remember to delete photos, messages and other personal stuff. But there\u2019s another kind of personal data that (almost) no one thinks about \u2014 and it needs to be erased not only from phones, but also from watches, printers and other smart devices \u2014 even your fridge. These are the settings for connecting to your Wi-Fi network.<\/p>\n<h2>The danger of leaky Wi-Fi access<\/h2>\n<p>Accessing someone else\u2019s Wi-Fi network has commercial value. The simplest and most innocent (albeit naughty) form is <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-wifi-from-neighbors\/39039\/\" target=\"_blank\" rel=\"noopener nofollow\">using a neighbor\u2019s connection<\/a>. Far less innocent is data theft: in a home or office network, devices usually trust each other, so connecting to someone else\u2019s Wi-Fi makes it easy to steal photos and documents from other network devices.<\/p>\n<p>Even worse is when a Wi-Fi network is infiltrated for illegal activity, such as spamming or DDoS attacks. Exploiting a discovered Wi-Fi network just once, an attacker can hack a device on it (the router itself, home network-attached storage (NAS), a video surveillance camera, or any other <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/smart-home\/\" target=\"_blank\" rel=\"noopener nofollow\">easily hackable devices<\/a>) \u2014 and then use it as a proxy server, without further recourse to Wi-Fi \u201cservices\u201d. Such proxies operating from home networks are <a href=\"https:\/\/thehackernews.com\/2023\/07\/avrecon-botnet-leveraging-compromised.html\" target=\"_blank\" rel=\"nofollow noopener\">in steady demand from cybercriminals<\/a>. Of course, the owner of the hacked device bears the brunt: their internet is slower; their IP address lands in various denylists; and, in rare cases, they might get blocked by the ISP or even get a police visit.<\/p>\n<p>As for printers, cameras and other devices on an office network, their Wi-Fi settings can be used to attack the company in question. This attack vector is great for hackers, because in many companies cybersecurity is set up to protect against threats from the internet, while office devices \u2014 especially printers \u2014 are paid little attention. By connecting to the Wi-Fi network, attackers can easily <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/wardriving-burglars-hacked-business-wi-fi-networks\" target=\"_blank\" rel=\"nofollow noopener\">carry out data theft and\/or ransomware attacks<\/a>.<\/p>\n<h2>How Wi-Fi settings get stolen<\/h2>\n<p>Most devices store Wi-Fi network information in unprotected form, making it child\u2019s play to retrieve it from a discarded or sold-on gadget. It\u2019s also not hard to find out who previously owned it:<\/p>\n<ul>\n<li>If you sold it, the buyer knows it came from you;<\/li>\n<li>If you decided to recycle the device, it\u2019s possible you left your contact details when turning it in;<\/li>\n<li>If you threw it away, most likely it was somewhere very close to where you used the device.<\/li>\n<\/ul>\n<p>A bad factory reset also leaves behind many clues: the device name often points to the owner (<em>Alex\u2019s iPhone 8<\/em>), and the Wi-Fi network name \u2014 to their address or employer (<em>TheBensonsHouse<\/em>, <em>Volcano_Coffee_staff<\/em>).<\/p>\n<p>Such pointers make your Wi-Fi network easy to locate, and the password for it is right there in the device memory. For added credibility, attackers can connect to your network by spoofing the MAC address of the discarded device.<\/p>\n<h2>How to guard against Wi-Fi leaks<\/h2>\n<p><strong>Reset and wipe<\/strong>. The most obvious security measure is to wipe the settings from all devices before parting with them. For laptops and computers, it\u2019s recommended to physically format the drive; for other equipment, we advise a full factory reset with deletion of all data. After resetting, go to the network settings and make sure that everything\u2019s really gone \u2014 then do another reset to make doubly sure. Unfortunately, the quality of factory resets varies depending on the device and the manufacturer, and there\u2019s no cast-iron guarantee that a reset really does delete everything. For example, <a href=\"https:\/\/psirt.canon\/advisory-information\/cp2023-003\/\" target=\"_blank\" rel=\"nofollow noopener\">Canon recently reported an issue in 200 printer models<\/a> in which the reset failed to clear the Wi-Fi settings. Canon\u2019s advisory explains that a double reset is required, but for many other devices there\u2019s simply no reliable way to clear the network settings.<\/p>\n<p><strong>Changing the Wi-Fi settings.<\/strong> This method is fiddly, but reliable and not too difficult technically. After getting rid of a device, <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-home-wifi\/13371\/\" target=\"_blank\" rel=\"noopener nofollow\">change your Wi-Fi network password and update the settings on all your other devices<\/a>. The fewer devices you have, the less trouble, of course. Always use strong, long passwords. And when you change one, generate a password randomly rather than just adding a number or letter at the end. <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Password Manager<\/a>, included in a <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a> subscription, will help you do this. In the Wi-Fi settings, select WPA2 or WPA3 encryption.<\/p>\n<p><strong>Strict access control<\/strong>. Every Wi-Fi-connected device has its own network access rights. For office and well-configured home networks, managing Wi-Fi access rights at the device level will help \u2014 your Wi-Fi router must support these settings. Configure your router so that any unknown or newly connected device is completely isolated and prohibited from accessing the internet or any device on your home network until you explicitly allow it to do so. When discarding or selling a device, be sure to isolate it in the router settings \u2014 not just remove it from the list. Then, even if attackers try to connect to the router through stolen credentials, no access will be granted.<\/p>\n<p><strong>A simple option for Wi-Fi access control.<\/strong> For those who find the previous method a bit too complicated, we recommend our <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-secure-smart-home\/47472\/\" target=\"_blank\" rel=\"noopener nofollow\">smart home security guide<\/a>, which takes a detailed look at how to properly configure home Wi-Fi and segment it for different categories of devices: computers, smartphones, smart home gadgets, and guest devices. To protect your home Wi-Fi from outsiders, we recommend the Devices on My Network feature in <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a>. At first launch, the feature automatically maps your home network and identifies the name and type of each device, after which it continuously monitors the network for the appearance of \u201cstrangers\u201d and warns you if a new unknown device pops up. If something in the list looks out of place, you can investigate and take action: from changing your Wi-Fi password to disabling unknown devices. And <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a> will guide you through the process.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>What settings do you need to clear before getting rid of a gadget?<\/p>\n","protected":false},"author":2722,"featured_media":48775,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683,9],"tags":[1058,794,187,43,623,473,97,660,321,131,174],"class_list":{"0":"post-48774","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-ddos","10":"tag-iot","11":"tag-passwords","12":"tag-privacy","13":"tag-recycling","14":"tag-routers","15":"tag-security-2","16":"tag-smart-home","17":"tag-technology","18":"tag-tips","19":"tag-wi-fi"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/wifi-protection-for-gadget-disposal\/48774\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/wifi-protection-for-gadget-disposal\/26063\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/wifi-protection-for-gadget-disposal\/21517\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/wifi-protection-for-gadget-disposal\/28759\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/wifi-protection-for-gadget-disposal\/26374\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/wifi-protection-for-gadget-disposal\/26611\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/wifi-protection-for-gadget-disposal\/27957\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/wifi-protection-for-gadget-disposal\/35871\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/wifi-protection-for-gadget-disposal\/20899\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/wifi-protection-for-gadget-disposal\/21686\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/wifi-protection-for-gadget-disposal\/30435\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/wifi-protection-for-gadget-disposal\/26652\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/wifi-protection-for-gadget-disposal\/32363\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/wifi-protection-for-gadget-disposal\/32030\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/wi-fi\/","name":"wi-fi"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=48774"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48774\/revisions"}],"predecessor-version":[{"id":48777,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48774\/revisions\/48777"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/48775"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=48774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=48774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=48774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}