Geekzone: technology news, blogs, forums
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
Survey reveals hackers hunt for wireless networks whilst commuting
Posted on 28-Mar-2003 00:41 | Filed under: News

Survey reveals hackers hunt for wireless networks whilst commuting
A wireless ‘honeypot’ set up by KPMG LLP to monitor wireless hacking and so-called ‘war driving’ activity has revealed that the most popular time to try to access wireless networks is on the way to and from work. War driving is a real-life game where individuals intercept wireless networks. Most do it as a hobby, and in some case to use the network to access the Internet. Others do it for more hostile purposes.

The dummy set-up, designed to appear as a legitimate corporate wireless network, recorded and analysed the activity of users trying to access it. The most popular time for war driving was between 9-10 am, where 24% of probes took place, and 5-6pm where 18% of probes took place. This suggests that people scan for wireless access points while driving in cars, or while on foot or cycling. Virtually no activity was recorded at weekends.

Three separate wireless points were set up at different points around the Square Mile in London, and ran for a week each, aimed at establishing the prevalence of war drivers, free-surfers and wireless hackers. An average of 3.4 probes were detected per working day. Given that RSA Security recently recorded 328 wireless access points in just seven areas in the financial district of London alone*, the research highlights the potential scale of unauthorised wireless access taking place.

Analysis of the probes revealed that 84 percent of those looking for wireless networks simply identified the presence of the network and moved on – typical behaviour of the ‘war-driver’. However, KPMG warns that these individuals were possibly charting maps of wireless access points for future use.

16 percent of probes ended in eventual network access, and three-quarters of those who did access the network undertook activity that would be described as hostile. Deliberately malicious behaviour included attempts to access systems and tamper with their set-up, and attempts to run computer commands that would damage the technology.

RSA’s survey also found that only a third of the networks detected in their financial district research were running special security technology for wireless networks.

“The activity recorded is significant, given the proliferation of wireless networks now being used by companies, and could adversely effect a typical business,” commented Mark Osborne, director of Security Services at KPMG. “The project dispels the myth that all unauthorised wireless activity is harmless. Risks include stealing bandwidth which slows the network down, or actual physical disablement of systems.”

The research showed that hackers appeared to have a less than basic knowledge of computers and networking. But whilst their attempts lacked sophistication, KPMG is warning that it may only be matter of time before they become more literate. It is emphasising that the risks of wireless intrusion include not only deliberate malicious attacks that paralyse systems, introduce viruses and result in data theft, but also ‘free surfers’ slowing the network, or gaining access to data that would breach the Data Protection Act, such as patient or customer records.

War drivers and hackers use normal laptop computers, running freely available software, which can detect accessible wireless networks. By simply clicking a mouse button they can access the detected network. Often, chalk marks are put on buildings or pavements where the wireless node is detected – known as war-chalking – as a marker for other war-drivers.

Tim Pickard, Strategic Marketing Director EMEA at RSA Security, comments, “Once again we are seeing how security seems to have been overlooked in the rush to implement wireless solutions. This research clearly demonstrates the very real dangers involved in leaving wireless LANs wide open to potential hackers. CEOs, CIOs and IT Managers need to understand that any investments they have made in securing their infrastructure can be swiftly negated if the backdoor is left open through the introduction of un-secured wireless LANs.”

More information:

Trending now »

Hot discussions in our forums right now:

Lock a barrel bolt?
Created by Kol12, last reply by Kol12 on 21-Mar-2019 18:50 (29 replies)
Pages... 2

Samsung Galaxy S10/S10 Lite/S10+ Announcement And Owners Thread
Created by Dial111, last reply by mrgsm021 on 23-Mar-2019 20:44 (574 replies)
Pages... 37 38 39

Support for 'Crusaders' name change appears to be growing..
Created by amiga500, last reply by netspanner on 25-Mar-2019 09:17 (102 replies)
Pages... 5 6 7

Another 737 Max 8 crash - no survivors
Created by Batman, last reply by Technofreak on 24-Mar-2019 21:10 (156 replies)
Pages... 9 10 11

Regional security screening
Created by larknz, last reply by amiga500 on 23-Mar-2019 17:01 (51 replies)
Pages... 2 3 4

Options for company VOIP system
Created by waikariboy, last reply by chevrolux on 21-Mar-2019 19:50 (10 replies)

Login to IRD via Safari on ipad
Created by onetapu, last reply by Handsomedan on 25-Mar-2019 13:29 (9 replies)

Joining weatherboards end to end without cracking
Created by timmmay, last reply by timmmay on 25-Mar-2019 12:21 (9 replies)