[ISN] InfoSec: 'Evil twin' Wi-Fi access points proliferate

From: InfoSec News (alerts@private)
Date: Thu Apr 26 2007 - 01:24:42 PDT


http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyId=12&articleId=9017825
  
By Jeremy Kirk
April 25, 2007 
IDG News Service

The next time you splurge on a double latte and sip it while browsing 
the Internet via the local cafe's Wi-Fi, beware of the "evil twin."

That's the term for a Wi-Fi access point that appears to be a legitimate 
one offered on the premises, but actually has been set up by a hacker to 
eavesdrop on wireless communications among Internet surfers. 
Unfortunately, experts say there is little consumers can do to protect 
themselves, but enterprises may be in better shape.

With the growth in wireless networks, the evil twin type of attack is on 
the rise, said Phil Cracknell, president of the U.K. branch of the 
Information Systems Security Association. Such attacks are much easier 
than others seeking log-ins or passwords, such as phishing, which 
involves setting up a fraudulent Web site and luring people to it, 
Cracknell said.

A rogue Wi-Fi connection can be set up on a laptop with a bit of simple 
programming and a special Universal Serial Bus thumb drive that acts as 
an access point. The access points are hard to trace, since they can 
suddenly be shut off, and they are easy to build, Cracknell said.

The growth in the number of Wi-Fi networks is providing more 
opportunities for hackers, who can make their networks appear to be 
legitimate by simply giving an access point a similar name to the Wi-Fi 
network on the premises. Since the hacker may be physically closer to 
the victim than the real access point, his signal will be stronger, 
potentially drawing more victims.

The hacker's computer can be configured to pass victims through to the 
legitimate access point while monitoring their traffic. Several free 
programs available on the Internet can decode packets to reveal 
clear-text log-ins and passwords.

"You are going to harvest some incredible information in a short span of 
time with a rogue hot spot," Cracknell said.

Corporate users can protect themselves by using virtual private networks 
(VPN) when logging into company servers, Cracknell said. But consumers 
are at a particular disadvantage, since they are likely not using VPNs 
and will access free Web e-mail applications that could send passwords 
in clear text.

Wi-Fi hot spot owners tend to be "absolutely ignorant" of the attack, 
although they should regularly monitor their network for rogue access 
points, Cracknell said. Another problem is reporting: Victims may not 
even know how their information was pinched, and those who run the hot 
spot may be reluctant to reveal that hackers exploited their network.

Consumers can protect themselves at least one way: be wary of free hot 
spots. Many airports and cafes charge for access, so a free hot spot 
could be designed to ensnare potential victims. Also, the attack has 
been used in hotels, with the so-called evil twin actually coming from a 
nearby hacker guest.

"This [attack] is foolproof to a degree," Cracknell said.


__________________________
Subscribe to InfoSec News
http://www.infosecnews.org



This archive was generated by hypermail 2.1.3 : Thu Apr 26 2007 - 01:38:05 PDT