Story image

Hackers exploit wireless networks, steal valuable information

28 Jan 16

Wireless networks are vulnerable, there’s no way around it, but there are steps organisations can take to better protect themselves, according to Netscout’s Fluke Networks Enterprise Solutions.

Terence Grey, Netscout Fluke Networks Enterprise Solutions system engineer, says, “If you have Wi-Fi, then you definitely have vulnerabilities. The point is to know what they are and have a solution in place so you know when you’re being attacked, and can mitigate the risk and consequences.

“It’s no coincidence that security incidents are increasing at a faster rate than ever before and are costing organisations significantly more.

“These increases match the growth of the wireless industry: the more we have connected people on the web, the more we have security incidents,” he says.

According to Netscout here are four key attack vectors used to hack wireless networks.

Snooping is an attack vector that is mostly undetectable as the attacker is just listening, usually using specialised equipment that is easily obtainable and cheap, says Grey.

It’s most effective against unencrypted networks and can become dangerous because the snooper can capture all of the company’s communications, he says.

Denial of Service (DoS) attacks lets attackers disconnect a single wireless client or all wireless clients from an access point.

These types of attacks have been around since the birth of the internet and are difficult to defend against, Grey says.

As well as denying access, they can also be used to redirect access to a so-called honeypot, which is an access point controlled by hackers, he says.

Cracking describes when hackers attempt to access a network by deducing or obtaining the wireless password.

The best defence against this type of attack is to choose passwords that are long and include multiple types of different characters, numbers, and symbols, Grey says.

Information theft is another key attack vector. Every mobile device is likely to connect to a wireless network at some point, in which case it will transmit different types of information, says Grey.

Hackers then listen to this information, which may include systems access data or sensitive commercial information, he says.

“If an attacker is trying to penetrate a company they’re not going to stick to a single method; they’re going to use multiple strategies.

“Wi-Fi is the lowest-hanging fruit, even if you have enterprise-level security in place. Keep in mind that the people protecting a network need to get it right all the time.

“A hacker only needs to get it right once, and they’re in. This makes it imperative for organisations to put strong security measures in place,” says Grey.

Netscout’s Fluke Networks Enterprise Solutions has identified five best practices for organisations to minimise the risk of being attacked. They are as follows:

  1. Start with a company security policy that specifically includes Wi-Fi.
  2. Create an employee security awareness program and ensure every employee participates.
  3. Practise safe networking with strong encryption and authentication, including client-side certificate validation.
  4. Police the network with a wireless intrusion detection system (WIDS) or wireless intrusion protection system (WIPS).
  5. Perform regular penetration testing to find out exactly where your vulnerabilities are so you can decide how to protect the organisation.
Three ways to achieve data security whilst enabling BYOD
"A mobility strategy is now more important than ever before, that said, selecting the right one is often no small task."
Mobile Infrastructure market sees fastest growth since 2014
The report from Dell’Oro shows that while the vendor rankings for the top three vendors remained unchanged with Huawei, Ericsson, and Nokia leading.
HPE unveils AI-driven operations for ProLiant, Synergy and Apollo servers
With global learning and predictive analytics capabilities based on real-world operational data, HPE InfoSight supposedly drives down operating costs.
How IoT and hybrid cloud will change in 2019
"Traditional VPN software solutions are obsolete for the new IT reality of hybrid and multi-cloud."
Enterprises to begin closing their data centres
Dan Hushon predicts next year companies will begin bidding farewell (if they haven't already) to their onsite data centres.
Citrix acquires micro app platform Sapho
Sapho’s micro applications improve employee productivity by consolidating access to tools, activities and tasks in a simple and unified work feed.
HPE expands AI-driven operations
HPE InfoSight extends select predictive analytics and recommendation capabilities to HPE servers, enabling smarter, self-monitoring infrastructure.
Dimension Data nabs three Cisco partner awards
Cisco announced the awards, including APJ Partner of the Year, at a global awards reception during its annual partner conference.