Geekzone: technology news, blogs, forums
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
Survey reveals hackers hunt for wireless networks whilst commuting
Posted on 28-Mar-2003 00:41 | Tags Filed under: News

Survey reveals hackers hunt for wireless networks whilst commuting
A wireless ‘honeypot’ set up by KPMG LLP to monitor wireless hacking and so-called ‘war driving’ activity has revealed that the most popular time to try to access wireless networks is on the way to and from work. War driving is a real-life game where individuals intercept wireless networks. Most do it as a hobby, and in some case to use the network to access the Internet. Others do it for more hostile purposes.

The dummy set-up, designed to appear as a legitimate corporate wireless network, recorded and analysed the activity of users trying to access it. The most popular time for war driving was between 9-10 am, where 24% of probes took place, and 5-6pm where 18% of probes took place. This suggests that people scan for wireless access points while driving in cars, or while on foot or cycling. Virtually no activity was recorded at weekends.

Three separate wireless points were set up at different points around the Square Mile in London, and ran for a week each, aimed at establishing the prevalence of war drivers, free-surfers and wireless hackers. An average of 3.4 probes were detected per working day. Given that RSA Security recently recorded 328 wireless access points in just seven areas in the financial district of London alone*, the research highlights the potential scale of unauthorised wireless access taking place.

Analysis of the probes revealed that 84 percent of those looking for wireless networks simply identified the presence of the network and moved on – typical behaviour of the ‘war-driver’. However, KPMG warns that these individuals were possibly charting maps of wireless access points for future use.

16 percent of probes ended in eventual network access, and three-quarters of those who did access the network undertook activity that would be described as hostile. Deliberately malicious behaviour included attempts to access systems and tamper with their set-up, and attempts to run computer commands that would damage the technology.

RSA’s survey also found that only a third of the networks detected in their financial district research were running special security technology for wireless networks.

“The activity recorded is significant, given the proliferation of wireless networks now being used by companies, and could adversely effect a typical business,” commented Mark Osborne, director of Security Services at KPMG. “The project dispels the myth that all unauthorised wireless activity is harmless. Risks include stealing bandwidth which slows the network down, or actual physical disablement of systems.”

The research showed that hackers appeared to have a less than basic knowledge of computers and networking. But whilst their attempts lacked sophistication, KPMG is warning that it may only be matter of time before they become more literate. It is emphasising that the risks of wireless intrusion include not only deliberate malicious attacks that paralyse systems, introduce viruses and result in data theft, but also ‘free surfers’ slowing the network, or gaining access to data that would breach the Data Protection Act, such as patient or customer records.

War drivers and hackers use normal laptop computers, running freely available software, which can detect accessible wireless networks. By simply clicking a mouse button they can access the detected network. Often, chalk marks are put on buildings or pavements where the wireless node is detected – known as war-chalking – as a marker for other war-drivers.

Tim Pickard, Strategic Marketing Director EMEA at RSA Security, comments, “Once again we are seeing how security seems to have been overlooked in the rush to implement wireless solutions. This research clearly demonstrates the very real dangers involved in leaving wireless LANs wide open to potential hackers. CEOs, CIOs and IT Managers need to understand that any investments they have made in securing their infrastructure can be swiftly negated if the backdoor is left open through the introduction of un-secured wireless LANs.”

More information:

comments powered by Disqus

Trending now »

Hot discussions in our forums right now:

Kiwis to be hit with tax on online purchases
Created by Gordy7, last reply by Geektastic on 19-Nov-2017 13:07 (169 replies)
Pages... 10 11 12

Spark fibre conflict with ethernet switch.
Created by sam395, last reply by Lias on 16-Nov-2017 14:49 (18 replies)
Pages... 2

Request for Windows 10 alternatives to reduce data usage
Created by D1023319, last reply by lNomNoml on 17-Nov-2017 21:19 (23 replies)
Pages... 2

Curious updates from Bigpipe
Created by robjg63, last reply by hio77 on 17-Nov-2017 19:27 (11 replies)

Data hunt (free data game) is back!
Created by PhantomNVD, last reply by PhantomNVD on 19-Nov-2017 13:51 (67 replies)
Pages... 3 4 5

Replacing HDD on a Laptop
Created by MarkH67, last reply by Batman on 19-Nov-2017 13:43 (17 replies)
Pages... 2

Has your credit card been compromised recently? Do you use one of these companies
Created by dan, last reply by robjg63 on 18-Nov-2017 18:22 (16 replies)
Pages... 2

Potential heatpump issue
Created by theitman, last reply by MadEngineer on 19-Nov-2017 15:31 (7 replies)