InfoSec: 'Evil twin' Wi-Fi access points proliferate
Hackers are setting up 'free' wireless access so they can snoop on users
IDG News Service - The next time you splurge on a double latte and sip it while browsing the Internet via the local cafe's Wi-Fi, beware of the "evil twin."
That's the term for a Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up by a hacker to eavesdrop on wireless communications among Internet surfers. Unfortunately, experts say there is little consumers can do to protect themselves, but enterprises may be in better shape.
With the growth in wireless networks, the evil twin type of attack is on the rise, said Phil Cracknell, president of the U.K. branch of the Information Systems Security Association. Such attacks are much easier than others seeking log-ins or passwords, such as phishing, which involves setting up a fraudulent Web site and luring people to it, Cracknell said.
A rogue Wi-Fi connection can be set up on a laptop with a bit of simple programming and a special Universal Serial Bus thumb drive that acts as an access point. The access points are hard to trace, since they can suddenly be shut off, and they are easy to build, Cracknell said.
The growth in the number of Wi-Fi networks is providing more opportunities for hackers, who can make their networks appear to be legitimate by simply giving an access point a similar name to the Wi-Fi network on the premises. Since the hacker may be physically closer to the victim than the real access point, his signal will be stronger, potentially drawing more victims.
The hacker's computer can be configured to pass victims through to the legitimate access point while monitoring their traffic. Several free programs available on the Internet can decode packets to reveal clear-text log-ins and passwords.
"You are going to harvest some incredible information in a short span of time with a rogue hot spot," Cracknell said.
Corporate users can protect themselves by using virtual private networks (VPN) when logging into company servers, Cracknell said. But consumers are at a particular disadvantage, since they are likely not using VPNs and will access free Web e-mail applications that could send passwords in clear text.
Wi-Fi hot spot owners tend to be "absolutely ignorant" of the attack, although they should regularly monitor their network for rogue access points, Cracknell said. Another problem is reporting: Victims may not even know how their information was pinched, and those who run the hot spot may be reluctant to reveal that hackers exploited their network.
Consumers can protect themselves at least one way: be wary of free hot spots. Many airports and cafes charge for access, so a free hot spot could be designed to ensnare potential victims. Also, the attack has been used in hotels, with the so-called evil twin actually coming from a nearby hacker guest.
"This [attack] is foolproof to a degree," Cracknell said.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- How WAN Optimization Helps Enterprises Reduce Costs If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity...
- Redefine Your IT Operations: Remote Office IT Has Never Been Simpler Join us to see why PC Pro named Dell PowerEdge VRTX the "2013 Server of the Year." PowerEdge VRTX may be just what...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Hardware White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!