Story image

Hackers exploit wireless networks, steal valuable information

28 Jan 2016

Wireless networks are vulnerable, there’s no way around it, but there are steps organisations can take to better protect themselves, according to Netscout’s Fluke Networks Enterprise Solutions.

Terence Grey, Netscout Fluke Networks Enterprise Solutions system engineer, says, “If you have Wi-Fi, then you definitely have vulnerabilities. The point is to know what they are and have a solution in place so you know when you’re being attacked, and can mitigate the risk and consequences.

“It’s no coincidence that security incidents are increasing at a faster rate than ever before and are costing organisations significantly more.

“These increases match the growth of the wireless industry: the more we have connected people on the web, the more we have security incidents,” he says.

According to Netscout here are four key attack vectors used to hack wireless networks.

Snooping is an attack vector that is mostly undetectable as the attacker is just listening, usually using specialised equipment that is easily obtainable and cheap, says Grey.

It’s most effective against unencrypted networks and can become dangerous because the snooper can capture all of the company’s communications, he says.

Denial of Service (DoS) attacks lets attackers disconnect a single wireless client or all wireless clients from an access point.

These types of attacks have been around since the birth of the internet and are difficult to defend against, Grey says.

As well as denying access, they can also be used to redirect access to a so-called honeypot, which is an access point controlled by hackers, he says.

Cracking describes when hackers attempt to access a network by deducing or obtaining the wireless password.

The best defence against this type of attack is to choose passwords that are long and include multiple types of different characters, numbers, and symbols, Grey says.

Information theft is another key attack vector. Every mobile device is likely to connect to a wireless network at some point, in which case it will transmit different types of information, says Grey.

Hackers then listen to this information, which may include systems access data or sensitive commercial information, he says.

“If an attacker is trying to penetrate a company they’re not going to stick to a single method; they’re going to use multiple strategies.

“Wi-Fi is the lowest-hanging fruit, even if you have enterprise-level security in place. Keep in mind that the people protecting a network need to get it right all the time.

“A hacker only needs to get it right once, and they’re in. This makes it imperative for organisations to put strong security measures in place,” says Grey.

Netscout’s Fluke Networks Enterprise Solutions has identified five best practices for organisations to minimise the risk of being attacked. They are as follows:

  1. Start with a company security policy that specifically includes Wi-Fi.
  2. Create an employee security awareness program and ensure every employee participates.
  3. Practise safe networking with strong encryption and authentication, including client-side certificate validation.
  4. Police the network with a wireless intrusion detection system (WIDS) or wireless intrusion protection system (WIPS).
  5. Perform regular penetration testing to find out exactly where your vulnerabilities are so you can decide how to protect the organisation.
On the road again: How to tackle mileage reporting for business
There may not be too much of a budget for company vehicles in an SMB’s day-to-day business, which means many people are increasingly using their own vehicles for work purposes.
Digital experience managers, get excited for Adobe Summit 2019
“Digital transformation may be a buzzword, but companies are trying to adapt and compete in this changing environment.”
HP extends laptop & workstation recall due to battery fire hazard
HP has extended its worldwide recall of several notebooks and mobile workstations due to the high risk of fire and burn hazards.
Privacy Bill may limit breach fines to $10,000
The Privacy Commissioner was seeking maximum breach fines of up to $1 million against body corporates.
Kathmandu breached, customer information accessed
Kathmandu is notifying potentially affected customers directly and has advised them to change their passwords for its online loyalty programme.
Was Citrix unaware of its own data breach until the FBI got involved?
According to a blog post from Citrix’s CSIO Stan Black, the FBI contacted Citrix on March 6 and advised that international cybercriminals had allegedly gained access to Citrix’s internal network.
How businesses can transform their customer experience in a realistic and timely way
“Businesses can’t simply decide to transform one day, then jump straight into making change for change’s sake."
Gartner: Marketing personalisation can be make or break
A Gartner survey shows brands risk losing 38% of customers because of poor marketing personalisation efforts.