Uncategorized

3 Successful Wireless Security Attacks in 1 Afternoon

By May 1, 2016May 5th, 2016No Comments
Compromising wireless security with honeypot attacks.

Compromising wireless security with honeypot attacks.

Wireless attack detection of ‘Honeypot Access Point (AP)’, aka ‘Evil-Twin’

 

In many cases, but surely not all, a wireless attack from a cyber-criminal could be orchestrated up to a mile away from a targeted person or corporation. We have also found the culprits in neighboring building, floors above or below, as well as within a company.

Hackers know how to create a strong access point (AP) that overrides the company’s access point and thus provides access to the entire network. That is, when an employee tries to login using a cell phone, PC, iPad, etc., via WiFi, they encounter the hacker’s ‘Honeypot AP’ instead, which paves the way for the hacker to get into the company system. When they are successful, you guessed it; the whole corporation is headed for trouble.

What happens then? Your network is compromised and the longer the fake AP is active the more the spy learns.

During a recent cyber sweep, we, Michael Guadagno & Associates, found three successful attacks into a company’s network. The rogue APs and rogue clients were active for an unknown timeframe undetected by the security system. The spy moved through the system injecting it with more Honeypot APs. The company was compromised and there was damage, but it could have been worse. Their trade secrets and confidential data could have been sold to the dark side in a matter of minutes.

Often the Honeypot AP is lurking at your door, unnoticed by some of the best security systems, waiting for that door of opportunity to open. There are many extremely successful hackers and groups out there that are more knowledgeable than the government admits, and their success is certainly not publicized. Some global groups work together causing their respective governments to struggle just to put a few of them down.

Working together with IT:

Your IT staff, we’re sure, is knowledgeable enough to realize our services and highly technical equipment is superior. We can provide them with information to enhance their expertise in keeping the network system in compliance. We work well with IT staff and they love us — they get all the credit. The best of the best work well as a team.

To schedule a Network Security sweep call Michael Guadagno & Associates at

Priority (716) 830-6757  or  Office (919) 363-6321

Leave a Reply