Can spyware spread through wifi and infect multiple devices? And are any simple ways to find it and erase it? Malwarebytes didn’t detect anything, only a PUP that has been removed.
So connecting to wifi is the same as connecting to any old network, so if you have someone wanting to get malware on your computer through a network, they could do so through wifi. However, I assume it’s not the case that simply connecting to wifi would expose you greatly, but that much I don’t know. There could be mitigations in an OS to help with this, so it could depend on the sophistication of the attack.
To add on what @InternetGhost already said, if you have an always-on VPN on your device many of these block LAN connections by default. ProtonVPN for example has a toggle in the settings which should be on by default.
could something be monitoring your network traffic with spyware? sure it is possible. However if you are using https or vpn(as already stated) it wont be an issue.
could spyware hop from one device to another? This is also possible. Make sure all your devices are properly firewalled, latest security updates are installed. If you are extremely concerned you can use docker containers that mitigate network mapping, and ids systems.
Docker containers cannot be used as a defense for stuff like this.
Ill find it later when i have time, but there is a docker program out there that makes network scanning a nightmare. it basically freezes nmap every time it hits a specific port. it would likely be enough to stop a malicious program from mapping a network. Not to stop a person, but a program.
Malware of all kinds (not just spyware) can spread through a network (ethernet or WiFi). That’s why some companies/governments use Air-Gapped Networking. To put it simply, this is where an entire network is isolated from other devices, and the internet. This means that if malware were to spread, the attacker would initially require physical access.
If host is compromised docker containers are compromised too. Dockers serve a different purpose than the one you intend to do. They run in namespace and are quite privileged.
i cant seem to find it, but it was simply a docker container that would run and if a program(like malware) tried to map a network for anything exploitable. This docker program would cause the network scan to get stuck once it hit that containers ip address and not return anymore information. im not the most tech savvy person on the planet, but it seemed like a cool little idea.