SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
UK Wireless
Network
Hijacking
A CPP white paper




October 2010
Contents                                                                                          2
                                 1.1 Foreword
                                 1.2 Industry Facts
                                 1.3 Research methodology
                                 1.4 Key Findings
                                      - Nearly half of home Wi-Fi networks can be hacked in less than five seconds
                                      - The majority of people mistakenly think their networks are secure
                                      - The majority of people do not think their network has been used without
                                        their permission
                                      - One in six wireless users say they regularly use public networks
                                      - It is easy to attract users to a rogue wireless network
                                      - Wireless networks are used for checking e-mails, online shopping
                                        and banking


                                 1.5 Conclusion
                                 1.6 Steps & Ways to Protect Yourself
                                 1.7 Further Information
                                 1.8 About CPP




 UK Wireless Network Hijacking                                                                              October 2010
Introduction                                                                                            3
                                  1.1 Foreword

                                  There is no doubt that we live in
                                  an ever increasing mobile and
                                  complicated society.
                                  If you had asked the average person in the street five years ago how their identity could be
                                  stolen, bin raiding and theft of mail would, certainly, have figured prominently. Today, ask
                                  the same question and you’re likely to get a multitude of responses including data leaks,
                                  institutional theft, bin raiding, phishing, computer viruses, malware, Trojans, botnets and
                                  so on.
                                  One area that has had little public discussion is the use of wireless or Wi-Fi networks and
                                  how secure these are. As this report highlights, without doubt, Wi-Fi networks pose a risk
                                  if they are not properly secured and visible to brute force attack.
                                  The number of people falling victim to identity fraud continues to climb; in the last industry
                                  statistics published by CIFAS, the UK’s Fraud Prevention Service, nearly 80,000 instances
                                  of identity fraud were identified by CIFAS Members in the first nine months of 2010 – an
                                  increase of nearly 10% from the same period in 2009. In the same period there was an
                                  18% increase in the number of victims of impersonation; clearly the battle against identity
                                  fraud is just beginning and one that requires continued vigilance, perseverance, self-
                                  monitoring and management as well as help from industry and private-sector identity
                                  protection products and services.
                                  If people take a proactive approach to managing and protecting their identities they are
                                  more likely to detect and prevent an attack occurring. And if the worst should happen,
Wi-Fi networks                    at least be able to manage the situation.

 pose a risk if                   Most recently the National Fraud Authority has published a report estimating that every
                                  year in the UK identity fraud costs more than £2.7 billion and affects over 1.8 million
 they are not                     people and of this figure at least £1.9 billion is the amount gained by the fraudster.
                                  These are staggering statistics and should be a catalyst for implementing increased
    properly                      public education and awareness and for consumers to take personal responsibility for
                                  their identities.
 secured and
visible to brute
  force attack




  UK Wireless Network Hijacking                                                                                    October 2010
4
                                  1.2 Industry Facts
                                       - Software security firm, Norton, reported that 65% of web users have been a
                                         victim of cyber crime
                                         (source: Computing 09 September, 2010)

                                       - In the same survey 80% of web users don’t believe the cybercriminals
                                         will be caught
                                       - Hackers have stolen up to £6 million from online bank accounts in Britain after
                                         infecting computers with a virus known as ‘zeus’
                                         (source: Telegraph 29 September, 2010)

                                       - On 24 September, cyber-vigilantes leaked personal information relating to the
                                         download of pornographic films on the internet
                                         (source: guardian 2 October, 2010)

                                       - The police cybercrime unit can only tackle 11% of the 6,000 known organised
                                         criminal gangs that regularly use computers for illegal purposes according to
                                         the Metropolitan Police Commissioner, Paul Stephenson
                                         (source: info security 4 October, 2010)

                                       - The US leads the world in numbers of Window PCs that are part of botnets.
                                         More than 2.2 million US PCs were found to be part of botnets, networks of
                                         hijacked home computers, in the first six months of 2010
                                         (source Microsoft BBC Technology News 13 October, 2010)




    Software
 security firm,
     Norton,
 reported that
  65% of web
   users have
been a victim
of cyber crime




  UK Wireless Network Hijacking                                                                              October 2010
5
                                1.3 Research Methodology
                                ICM interviewed a random sample of 2,022 adults aged 18+ online between 16 - 19
                                September 2010. Surveys were conducted across the country and the results have been
                                weighted to the profile of all adults. ICM is a member of the British Polling Council and
                                abides by its rules. Further information at www.icmresearch.co.uk
                                Separately during September 2010, CPP employed the services of an ethical hacker and
                                Senior Vice President of CRYPTOCARD, Jason Hart, who conducted a number of reviews
                                relating to Wireless Networks and Wireless users. The reviews were focused around
                                Wireless WarDriving, Public Wireless Hot Spots and the use of Rogue Wireless Access
                                Points.
                                         - WarDriving: CPP’s ethical hacker drove around each of the different cities,
                                           looking for wireless networks, using special software on a laptop computer.
                                           This was done in both residential and business areas. Following the Wardrive,
                                           CPP’s ethical hacker monitored the number of visible networks and what
                                           security settings were in place.
                                         - Public Wireless Hot spots: The second part of the experiment was to quantify
                                           the extent of security problems and raise awareness - not to ‘hunt down’
                                           targets. The aim was to identify the number of potential users that use public
                                           hotpots within a given time frame and understand what potential sensitive
                                           information is visible across public hotspots where it could be intercepted by a
                                           nearby individual or Hacker also using wireless technology.
                                         - Creating fake wireless hubs: The third aspect of the experiment involved going
                                           into public places and creating rival wireless routers to capture people logging
                                           on to free Wi-FI. Using specialist software, CPP’s ethical hacker recorded the
                                           number of people logging-on to the rival wireless hub and what passwords and
                                           usernames they were using.


                                The review was conducted within six cities – Bristol, Cardiff, Edinburgh, London,
                                Manchester and Birmingham.
                                It is important to note that at no point during this review was any unauthorised access
                                gained to any user of any wireless network.
                                This report (specifically the survey findings that constitute it) is intended as a reference
                                document to highlight the potential threat that Wireless Networks and devices pose.
                                The survey demonstrates that residential and wireless devices users within Bristol, Cardiff,
                                Edinburgh, London, Manchester and Birmingham today should think about what they may
                                be forfeiting by continuing to utilise wireless network technology without thinking about
                                their online security. The report is designed to highlight and address the potential security
                                vulnerabilities associated with using wireless systems, and to avoid being another
                                ‘drive-by victim’.




UK Wireless Network Hijacking                                                                                   October 2010
6
                                  1.4 Key Findings
                                  Nearly half of home Wi-Fi networks can be hacked in less
                                  than five seconds
                                  In an ‘ethical hacking’ experiment conducted across six UK cities, nearly 40,000 networks
                                  were revealed as ‘high-risk’, opening up the personal data of thousands of individuals. This
                                  is because they were immediately visible to wardriving software, which puts them at direct
                                  risk from hackers, who, with the right knowledge, can override even the most secure
                                  systems. Beyond this, many networks had easily identifiable SSID or “Service Set
                                  Identifier”, which revealed the name of their business and where it was situated.


                                  City         Total       Total       Total       Total        Total        Total        Residential
                                               Number of   Number of   Number of   Number       Number       Number       Networks
                                               Wireless    Public      Networks    Using WEP    using WPA    Using WPA2
                                               Networks    Hotspots    with No     Encryption   Encryption   Encryption
                                                                       Security
                                  Birmingham   3323        340         916         403          606          998          923
                                  Cardiff      11375       647         1409        813          1073         6494         3412
                                  London       14908       1777        4746        2667         2554         3953         7258
                                  Manchester   2894        650         870         793          0            1231         1663
                                  Birmingham   3753        333         910         587          1142         836          2761
                                  Edinburgh    1956        158         398         260          597          626          1019


                                  CPP recruited Jason Hart, Senior Vice President of CRYPTOCard, as our ethical hacker, to
                                  conduct a Wardrive experience within the main arterial routes of each city listed above.
                                  During the Wardrive Jason was able to easily identify exposed wireless networks
 nearly 40,000                    emanating traffic into the street. Once the wireless networks were identified – in total
                                  38,209 – Jason pinpointed the exact frequency, estimated the location of the source, and
networks were                     identified the Wireless ID (SSID) used. The scan also identified whether the WLAN was
                                  utilising encryption and any other apparent security characteristics of the network to
  revealed as                     determine access potential. We found that 20,110 had a good standard of Wi-FI Protected
                                  access (WPA or WPA2) providing network administrators with a high-level of assurance
  ‘high-risk’,                    that only authorised users can access the network.

opening up the                    However, the fact that nearly 40,000 wireless networks were visible means that they
                                  cannot be considered 100% secure. Idappcom, the data traffic analysis and security
 personal data                    specialist has reported that the release of ElcomSoft’s Wireless Security Auditor (EWSA)
                                  software, recently refreshed with the addition of an enhanced WPA2 password recovery
 of thousands                     facility, is actually a ‘brute force’ cracking application, meaning that WiFi connections can
                                  be longer be considered secure.
 of individuals                   Idappcom’s chief technology officer has said “The update of EWSA means that, with the
                                  professional version installed, hackers can use a computer with up to 32 CPUs and 8 GPUs
                                  to crack WiFi encryption using a brute force attack.
                                  “Although the professional version edition costs almost $1,200, it’s reportedly possible to
                                  download a trail version of the software and crack it using utility files available via
                                  filesharing networks .”




  UK Wireless Network Hijacking                                                                                       October 2010
7
                                According to Idappcom’s CTO, the reality is that the software can brute force crack as
                                many as 103,000 Wi-Fi passwords per second, which equates to more than six million
                                passwords a minute – on a HD5390 graphics card-equipped PC.
                                With regards to company’s wireless networks, the arrival of the refreshed version of EWSA
                                means that users can no longer trust that their Wi-Fi connection – unless they use a VPN
                                – is truly secure.
                                There were, however, over 9,000 that had no security and a further 5,000 that had only
                                Wired Equivalent Privacy (WEP) encryption which is the lowest form of network security
                                and is rapidly being phased-out by businesses and organisations for more secure forms,
                                including WPA and WPA2.
                                The overall purpose of the Wardrive was to quantify the extent of security problems and
                                raise awareness - not to ‘hunt down’ targets.
                                The aim was to identify networks that emanated wireless signals excessively into a public
                                place where it could be intercepted accidentally or otherwise (i.e. by a nearby individual or
                                company also using wireless technology, or by a hacker).
                                The following processes were not conducted by and were considered inappropriate or
                                outside the scope of this Wardrive:
                                         - Sniffing of network traffic
                                         - Connection to any of the detected networks
                                         - Attempt to crack any encryption keys (WEP, WPA,WPA2)
                                         - Targeting of ‘high profile’ businesses
                                         - Installation and use of a high gain antenna
                                         - Use of ‘cracking’ software to decrypt encryption keys


                                In addition, our ethical hacker did not check any access points for default passwords and
                                made a special effort to make sure he did not connect to any to any of the wireless LANs
                                that were detected. It should also be noted that the survey did not include analysis of the
                                data packets themselves. Instead, the means of positive identification of networks were
                                limited to the following information:
                                         - Wireless Network SSID
                                         - Wireless Network Name
                                         - Encryption type used
                                         - Wireless access point model
                                In order to conduct the Wireless Wardrive, the following equipment was used:
                                         - Toshiba Laptop with built in Wireless Network Card
                                         - Vistumbler – A wireless network freeware scanning tool
                                           http://www.vistumbler.net




UK Wireless Network Hijacking                                                                                    October 2010
8
                                The majority of people mistakenly think their networks are secure
                                According to the findings, nearly a quarter of private networks in the Wardrive experiment
                                have no password whatsoever attached, making them immediately accessible to criminals.
                                This is despite the majority (82%) of people mistakenly thinking their network is secure.
                                Even password protected networks are not secure. A typical password can be breached by
                                hackers in a matter of seconds.
                                Those aged 18-24 years old are the most (88%) likely to think their wireless network is
                                secure verses 77% of people aged 65+. There are probably numerous reasons for this, but
                                the overriding assumption we can make here is that this demographic are probably the
                                least aware of the technology used and the associated level of risk, protection and threats.
                                Men tend to be more optimistic than women with 85% thinking their wireless network is
                                secure verse 80% of women.



                                Q: Do you think the wireless network you use is secure? By Gender



                                  100

                                                                             85%
                                          82%
                                                                                                       80%
                                   80



                                   60



                                   40



                                   20                                                                                 14%
                                                            12%
                                                                                               9%
                                                   6%                                  6%                      6%


                                    0
                                                  Total                              Male                    Female

                                           Yes
                                           No
                                           Don’t Know




UK Wireless Network Hijacking                                                                                   October 2010
9
                                Q: Do you think the wireless network you use is secure? By age...

                                  100

                                        88%
                                                           85%                                84%              84%

                                                                            78%
                                   80                                                                                           77%




                                   60



                                   40



                                                                                                                                           18%
                                   20
                                                                                        12%              12%              11%
                                                                      10%         10%
                                                   9%
                                                                 6%                                                  5%               5%
                                                                                                    4%
                                              3%

                                    0
                                          18-24              25-34            35-44             45-54                55-64             65+

                                              Yes
                                              No
                                              Don’t Know




                                The majority of people do not think their network has been used without
                                their permission
                                Hacking into a private network not only allows unscrupulous individuals to ‘cloak’ criminal
                                activities such as purchasing illegal pornography or selling on stolen goods. It also allows
                                them to view the private transactions made by individuals over the wireless network,
                                accessing passwords and usernames, which can then be used to impersonate the victim
                                and commit identity fraud.
                                Worryingly, only 4% of people know for certain that their network has been used without
                                their permission, indicating that the vast majority remain ignorant of the risk, or that this
                                may have happened to them.
                                Those aged 18-24 were the most likely to know for certain that their wireless network has
                                been used by an outside party; perhaps because they are the most familiar with this type
                                of technology and the warning signs. Nearly one in five had no idea whether their wireless
                                had been used without their permission.




UK Wireless Network Hijacking                                                                                                   October 2010
10
                                  Mark, from London:
                                  “On the day before Christmas Eve last year, I arrived home after a night out at the theatre
                                  to find that my flat door had been broken down.
                                  “Initially I thought I’d been burgled, but when I came into my home I discovered a search
                                  warrant for stolen goods and instructions to call CID.
                                  “After a very worrying Christmas period, I met with the police and was informed that
                                  they’d been acting on evidence that a stolen laptop that had been opened using my wi-fi
                                  connection. Putting two and-two together, I realized that I had no password attached to
                                  my wi-fi and that it must have been used illegally by criminals.
                                  “I was compensated for my door but obviously the episode was very worrying and made
                                  me realise just how important it is to secure your wi-fi connection.”




                                  Q: Has your wireless network ever been used without your permission...? By gender...



                                   80
                                                                                         73%
                                                      72%                                                                     71%

                                   70

                                   60

                                   50


                                   40

  only 4% of                       30

 people know                       20                               18%                              17%
                                                                                                                                          19%



for certain that                   10
 their network                      0
                                         4%     4%
                                                             2%
                                                                               4%   4%
                                                                                                1%
                                                                                                                3%       4%
                                                                                                                                     2%




has been used                                 Yes
                                                     Total

                                                                  Not Applicable
                                                                                         Male                                 Female


 without their                                Possibly
                                              No
                                                                  Don’t Know


  permission




  UK Wireless Network Hijacking                                                                                                     October 2010
11
                                Q: Has your wireless network ever been used without your permission...? By age..

                                                                                                                                                                        80%
                                 80                                                                                                            77%
                                                                                               73%                      74%


                                 70                                     66%
                                             65%


                                 60

                                 50


                                 40

                                 30
                                                                               22%                                             21%
                                                                                                          20%
                                 20                     17%
                                                                                                                                                                               15%
                                                                                                                                                          12%
                                           10%
                                 10   7%                      6%
                                                                   5%                                                                5%
                                                                                          4%                                                         3%                   3%
                                                   1%                     1%         2%              1%         2% 2%     2%              3%
                                                                                                                                                                1% 2%
                                  0
                                           18-24                   25-34                  35-44                    45-54                   55-64                         65+

                                             Yes               Not Applicable
                                             Possibly          Don’t Know
                                             No


                                One in six wireless users say they regularly use public networks
                                This report clearly highlights the dangers of accessing the internet over publicly available
                                networks. While 16% access Wi-Fi networks in open zones e.g. coffee shops, hotels,
                                airport lounges, a further 20% access networks via their mobile phones that automatically
                                connect to wireless networks. However this figure is almost certainly likely to be higher,
                                as many smartphone users either don’t realise that their phones use wireless networks,
                                or know that they are programmed with software which automatically connects them to
                                free wireless networks.
                                Those aged 18-24 were the most likely to connect to a wireless network in an open zone
                                (21%) verses only 9% of those aged 65+.
                                Only 22% of people said they didn’t use a wireless network, but this may not account
                                for their mobile applications that automatically connect to Wi-Fi networks, including
                                smartphones which are designed to connect automatically to openzones where available,
                                often without the user being aware.
                                In order to review the potential issues around these public hotspots, our ethical hacker,
                                Jason Hart, visited coffee shops and public locations in six cities using basic Wireless
                                equipped (listed below). During the review it was very easy to identify wireless users on
                                the public hotspots and in most case catalogue sensitive data that could have been
                                captured if needed. The data that could have been captured during the review could have
                                been – passwords, usernames and details of the website that the user of the public
                                hotspot was accessing.




UK Wireless Network Hijacking                                                                                                                                    October 2010
12
                                  The overall purpose of the Hotspot review was to quantify the extent of security problems
                                  and raise awareness - not to ‘hunt down’ targets. The aim was to identify the number
                                  of potential users that use public hotpots within a given time frame and understand
                                  what potential sensitive information is visible across public hotspots where it could
                                  be intercepted by a nearby individual or Hacker also using wireless technology.
                                  We were able to ‘harvest’, but didn’t, usernames and passwords from unsuspecting
                                  people at a rate of more than 350 an hour, sitting in town-centre coffee shops and
                                  restaurants.
                                  The table below shows the number of people whose wireless networks can could have
                                  accessed across the six cities during a one-hour time period, and the level of risk with
                                  100% of opportunities where access sensitive data was possible.


                                  City            Number of people accessed within a 1          Was sensitive data visible
                                                  hour time frame - Between the hours of       (Were permission granted)
                                                         12pm and 1pm week days
                                  Birmingham                       18                                    100%
                                  Cardiff                          15                                    100%
                                  London                           45                                    100%
                                  Manchester                       27                                    100%
                                  Birmingham                       34                                    100%
                                  Edinburgh                        14                                    100%




                                  The following processes were not conducted by and were considered inappropriate
                                  or outside the scope of this Wireless Hotspot review:
                                              - Cracking of passwords
                                              - Connection to devices
  Those aged                                  - Use of ‘cracking’ software
18-24 were the                    In addition, our ethical hacker did not access or collect any data on the devices or users.

 most likely to                   It should also be aware during the survey permission was granted from individuals to see
                                  if it was possible to retrieve sensitive information during them using Public Hotspots.

 connect to a                     In order to conduct the Public Hotspot review, the following equipment used:

   wireless                                   - Toshiba Laptop with built in Wireless Network Card
                                              - A network enumeration tool (used to indentify devices on the public hotspots)
 network in an                                - Cain & Able (this was only used were permission was given by individuals) this
  open zone                                     was used to capture sensitive data including passwords




  UK Wireless Network Hijacking                                                                                          October 2010
13
                                  Q: Where do you use wireless networks...? By gender...



                                  80

                                         70%                                                 71%
                                                                                                                                                        69%
                                  70

                                  60

                                  50


                                  40

                                  30

                                                20%                                                 21%                                                        20%
                                  20                   17%
                                                                                                          19% 18%
                                                              16%
                                                                                                                                                                         14% 14%
                                                                     11%                                            11%                                                                11%

                                  10
                                                                            1%     1%                                      1%                                                                1%        1%
                                                                                                                                      0
                                    0
                                                             Total                                               Male                                                       Female
 We were able                              At home                           While commuting/travelling

  to ‘harvest’,
                                  Q: Where do you use wireless networks...? By age...
                                           Through my mobile phone           At family/friends/relatives house
                                   100     At work                           On holiday/abroad/away from home

   but didn’t,
                                           Where open zones are
                                           available (e.g. coffee shops,
                                           hotels, airport lounges
   usernames                        80
                                         83%
                                                                     81%




and passwords
                                                                                              75%
                                                                                                                     73%




      from
                                                                                                                                                  61%
                                    60                                                                                                                                           56%




 unsuspecting
   people at a                      40         36%                         37%


                                                                                                   29%


 rate of more                                    26%                         27%

                                                      21%                        20%                 21%                        20%
                                    20                                              18%
                                                                                                        19%



  than 350 an                                           14%                                                14%            14%     15%                         14%
                                                                                                                                                    10%                                      9%
                                                                                                                                      9%                            9%
                                                                                                                                                         6%                             4%        6%


      hour                                                                                                    1%                                                         2% 1%     3%
                                                             1%                         1%                                                1% 2%                                                        2% 1%

                                     0
                                               18-24                        25-34                   35-44                   45-54                             55-64                           65+

                                                     At home                                        While Commuting
                                                     Through my mobile phone                        At family/friends/relatives house
                                                     At work                                        On holiday/abroad/away from home
                                                     Where open zones are
                                                     available(e.g. coffee shops,
                                                     hotels, airport lounges




  UK Wireless Network Hijacking                                                                                                                                                    October 2010
14
                                  It is easy to attract users to a rogue wireless network
                                  In order to review the potential issues around public hotspots, our ethical hacker, Jason
                                  Hart, visited coffee shops and public locations access six cities.
                                  In order to conduct this review Jason used a portable wireless network router connected
                                  to 3G broadband connection. The Wireless router was specially named to attract users to
                                  connect their wireless device to the Rogue network automatically. This was achieved by
                                  using different SSID names.
                                  During the review it was very easy to attract users to the rogue wireless network and in
                                  every case it would have been possible to catalogue sensitive data that could have been
                                  captured if needed. The data that could have been captured during the experiment could
                                  have included passwords, usernames and details of the website that the user of the public
                                  hotspot was accessing.
                                  The results below show that in just one hour, more than 200 people unsuspectingly logged
                                  onto a fake Wi-Fi network, putting themselves at risk from fraudsters, if they decided to do
                                  the same scam, could harvest their personal and financial information. In addition 80
                                  smartphones connected automatically to the rogue network putting the holder of those
                                  devices at risk from the capture of their information, without their knowledge. This could
                                  include gaining access to personal and work emails, social networking sites or even online
   In just one                    shopping or banking sites.

   hour, more                     Elsewhere our ICM research told us that 48% of Wi-Fi users, connected to networks
                                  several times a day with nearly four out of ten connecting daily. Those aged 18-24 were
    than 200                      the most likely to connect several times a day (62%).


      people
unsuspectingly                    City            Number of people
                                               accessed within a 1 hour
                                                                              Number of people
                                                                          accessed within a 1 hour
                                                                                                      Devices automatically
                                                                                                       connected to rogue

logged onto a
                                               time frame with an SSID    time frame with an SSID         device within
                                                   of a Brand Name          of free Internet access      a 1 hour period


   fake Wi-Fi
                                  Bristol                16                          21                        4
                                  Cardiff                12                          11                        6


    network,
                                  London                 37                          51                        27
                                  Manchester             21                          32                        19

     putting                      Birmingham
                                  Edinburgh
                                                         39
                                                          9
                                                                                     43
                                                                                     15
                                                                                                               21
                                                                                                               7

 themselves at
    risk from
   fraudsters




  UK Wireless Network Hijacking                                                                                               October 2010
15
                                The overall purpose of the rogue wireless hotspot review was to quantify the extent of
                                security problems and raise awareness - not to ‘hunt down’ targets and to see if people
                                would just access or trust the access point they were accessing. The aim was to identify
                                the number of potential users that would connect to a rogue wireless hotspot within a
                                given time frame and understand what potential sensitive information is visible publicly
                                across public hotspots where it could be intercepted by a nearby individual or Hacker also
                                using wireless technology. The following processes were not conducted by and were
                                considered inappropriate or outside the scope of this Wireless Hotspot review:
                                         - Cracking of passwords
                                         - Connection to devices
                                         - Use of ‘cracking’ software
                                Jason Hart did not access or collect any data on the devices or users. In fact, during the
                                rogue hotspot review he made special effort to make sure that they never collected any
                                information. It should also be aware during the survey permission was granted from
                                individuals to see if it was possible to retrieve sensitive information during them using
                                Public Hotspots.
                                In order to conduct the Public Hotspot review, the following equipment used:
                                         - Toshiba Laptop with built in Wireless Network Card
                                         - Portable Wireless Access Point
                                         - 3G Broad Band USB device
                                         - Cain & Able (this was only used were permission was given by individuals) this
                                           was used to capture sensitive data including passwords




UK Wireless Network Hijacking                                                                                   October 2010
16
                                  Wireless networks are used for checking e-mails, online shopping
                                  and banking
                                  Of those respondents who use wireless networks, 85% use it for checking personal
                                  e-mails, 65% for online shopping and 63% for online banking.
                                  Women are more likely to use Wi-Fi networks for online shopping whereas men are
                                  marginally more likely to use it for online banking.
                                  Demographically, those aged 18-24 are the most likely to use Wi-Fi networks for online
                                  shopping and banking and social networking.
                                  With Wi-Fi networks open to external attack and fraudsters quietly harvesting sensitive
                                  personal and financial information, the risk of these common activities is brought into
                                  sharp focus. This is especially the case with public WI-FI networks, where many users
                                  naturally assume that the public networks they use are legitimate and therefore secure.
                                  But as these experiments demonstrate, there is nothing to stop hackers altering the name
                                  of a fraudulent network to mimic a legitimate one.
                                  Separately when we asked respondents who use Wi-Fi networks if they had ever logged
                                  onto somebody else’s unsecured wireless network without their permission, 20% said they
                                  had. People aged 18-24 were the most likely (37%) to have done this as opposed to 5% of
                                  those aged 65+.
                                  When we asked people why they had logged onto somebody else’s Wi-Fi network, over a
 Women are                        third (36%) said because it was available, 32% because it was convenient, 28% because it
                                  was easy to do, and 14% because they were having access problems with their own
more likely to                    wireless network. 5% said they had done so accidentally highlighting the ease to which

  use Wi-Fi
                                  this is possible.


 networks for                     Activity                             Total   Male   Female


     online                       Checking personal emails             85%     83%      86%

  shopping                        Online shopping
                                  Online banking
                                                                       65%
                                                                       63%
                                                                               63%
                                                                               63%
                                                                                        67%
                                                                                        62%

whereas men                       Buying or selling goods or sevices
                                  (e.g. ebay)
                                                                       50%     48%      51%


are marginally                    Social networking
                                  Transferring money (e.g. using
                                                                       48%
                                                                       45%
                                                                               43%
                                                                               45%
                                                                                        53%
                                                                                        45%

more likely to                    PayPal
                                  Booking holidays/tickets             40%     40%      41%

   use it for                     Checking work emails                 28%     30%      26%


online banking                    Job applications

                                  Amending work documents
                                                                       18%

                                                                       15%
                                                                               17%

                                                                               14%
                                                                                        18%

                                                                                        15%

                                  General browsing                     2%      2%       2%

                                  Research                             1%      1%       1%

                                  News websites                         0       0       1%

                                  Searching information                 0       0       1%




  UK Wireless Network Hijacking                                                                                 October 2010
17
                                1.5 Conclusion
                                Many residential homes and businesses now use wireless LAN (WLAN) connectivity
                                because it is convenient, cheap and easy to install. They allow for mobility around the
                                home and office and deliver great flexibility. Unfortunately, they can also be insecure
                                unless you take appropriate precautions. Unlike wired networks, wireless signals can be
                                intercepted and/or hijacked without the need to physically connect to the network.
                                However the report shows that a large number of people are aware of the issues of
                                security when it comes to deploying a wireless access home, but there still seems to be a
                                lack of awareness in relation to what encryption standard to use when deploying or using
                                a wireless access point and more importantly almost zero awareness when using public
                                and or rogue wireless access points.
                                The number of rogue hotspots in existence is extremely difficult to estimate - they exist for
                                relatively short periods of time in order to avoid detection, and are very simple to
                                implement and are extremely effective. There is also little need to maintain a rogue
                                hotspot, as they rapidly yield valuable information. The recent findings of this report show
                                that 100% of people accessed a rogue wireless access point if free wireless internet is
                                used as the Service Set Identifier (SSID). Such fake hotspots can even process credit card
                                details and allow internet access. This simple configuration could potentially be the next
                                big thing in identity theft as it has a greater capacity – and yields more accurate results –
                                than current phishing attacks. It is feasible that identities could be stolen using a system
                                like this. Rogue wireless has the potential to be the next big criminal tool; that is providing
                                it is not already.
                                It is important that people are made aware of the potential risks surrounding public
                                hotspots and that hotspots providers provide a method to reduce the risks of users by
                                means of education and mutual authentication.
                                The simple fact is that the vast majority of those targeted have no idea their information is
                                visible to other people. But by capturing usernames and passwords from standard e-mail
                                and social networking sites, a Hacker can gain access to sensitive personal and business
                                information. Beyond this, there is nothing to stop them committing credit card fraud,
                                applying for loans or even assuming their victims’ identities online.
                                Wireless network hacking or “wi-jacking” is an invisible crime. Because victims often have
                                no idea that they have been targeted until it is too late, it is extremely hard to quantify.
                                What we can be certain of, is that the number of devices with wireless capabilities are
                                increasing, especially with smartphones, where connectivity is automatic. Alongside this
                                the number of internet-based applications that rely on wireless access has rapidly
                                increased, meaning that the opportunities for wireless network hacking have also risen.
                                Consumers need to be aware and not bury their heads in the sand because they don’t
                                understand the technology or think it unlikely to ever happen to them. If consumers use
                                wireless networks they should ask about security and make it their business to know the
                                level of risk and what needs to be done to protect themselves. With over 80% confident
                                their wi-fi networks are secure, yet with nearly half of home wi-fi networks easily hacked in
                                less than five seconds, this is clearly not the case.
                                The value of products to protect peoples’ identities is brought into sharp focus when you
                                consider the evolving threat of identity fraud enabled by technological developments.




UK Wireless Network Hijacking                                                                                      October 2010
18
                                1.6 Steps and ways to protect yourself
                                Michael Lynch is an identity fraud expert at CPP and offers the following advice to
                                consumers to help protect them from identity fraud. Michael is responsible for the UK
                                Identity Protection portfolio at CPPGroup Plc (CPP).
                                Michael has been with CPP for 14 years. His experience in financial services extends to
                                customer service, new product and market development and affinity relationships.
                                During his time at CPP, Michael has helped bring to market one of the UK’s market leading
                                services, Identity Protection, which now protects over one million UK consumers from the
                                consequences of this rapidly growing crime. In addition, Michael had used his expertise to
                                create a commercial identity theft product aimed at protecting businesses of all sizes. He
                                has also developed a strong understanding of consumer perception and reaction to
                                identity theft and its consequences. In addition Michael has been responsible for breaking
                                some major identity theft stories in the media, including the availability of fraudulent
                                documents online, car cloning, junk mail and postal theft. Committed to forging industry
                                co-operation to reduce the opportunities for identity theft he is leading the call for
                                consumers to change their behaviour to counter what is becoming an increasingly
                                sophisticated and intrusive crime.
                                Michael is media trained across print and broadcast and is available for media interviews
                                on the issue of identity fraud.
                                Steps and Ways to Protect Yourself
                                1. Use encryption on your wireless access points (WAP) - Make sure you have Wi-Fi
                                   Protected Access 2 (WPA2) - the latest security standard introduced by global,
                                   non-profit industry association, the Wi-Fi Alliance. You can select products that use
                                   this method by looking for “Wi-Fi WPA2” in their specifications. WPA2 can operate in
                                   two modes, personal mode and enterprise mode.
                                   Personal mode – a pre-shared password or pass phrase used for authentication. This is
                                   a simple approach that ensures a computer can only get access to the WLAN if the
                                   password matches the access point’s password.
                                   Enterprise mode – a more sophisticated method that is better suited to larger
                                   organisations needing stronger protection.


                                2. By implementing a Virtual Private Network (VPN) you can create a secure wireless
                                   network. This is achieved by encrypting all of the data that passes over the ‘insecure’
                                   network so that it cannot be accessed by an eavesdropper.


                                3. Install a firewall (an electronic barrier that sits on a network server and protects the
                                   PCs hidden behind). You can use a firewall in a network to separate an insecure part of
                                   the network from the secure area where your most critical data is managed. Businesses
                                   that have an existing Internet connection will probably have a firewall already in place,
                                   but you should not assume that this would provide protection for your WLAN.




UK Wireless Network Hijacking                                                                                      October 2010
19
                                4. All wireless routers should have obscure IDs when they announce themselves to the
                                   world. Rather than put in any real information that can make it clear who owns the
                                   router or that can reveal your location or business name, use something common like
                                   “wireless” or “router 1” that doesn’t give away anything critical.


                                5. Try to position access points, which transfer data between your devices, away from the
                                   outside wall of your building to minimise leakage of radio signals. This limits the
                                   chances of interception from outside.


                                6. Don’t allow employees to add access points without management authorisation.
                                   One insecure access point could compromise your entire network




                                1.7 For further information please contact:
                                Nick Jones
                                Head of Communications
                                CPP Group Plc
                                Holgate Park
                                York YO26 4GA
                                Tel      01904 544 387
                                E-Mail   nick.jones@cpp.co.uk
                                Web      www.cppgroupplc.com




UK Wireless Network Hijacking                                                                                    October 2010
20
CPP is an award-                       1.8 About CPPGroup Plc
winning organisation:

- Winner in the European Contact       The CPPGroup Plc (CPP) is an international Life Assistance business offering bespoke
  Centre Awards, Large Team            management solutions to multi-sector business partners designed to enhance their
  of the Year category, 2010
                                       customer revenue, engagement and loyalty, whilst at the same time reducing costs to
- Finalist in the European Contact     deliver improved profitability.
  Centre Awards, Best Centre
  for Customer Service, Large          This is underpinned by the delivery of a portfolio of complementary Life Assistance retail
  Contact Centre of the Year
  categories, 2010
                                       products, designed to help our mutual customers cope with the anxieties associated with
                                       the challenges and opportunities of everyday life.
- Finalist in the National Sales
  Awards, Contact Centre Sales         Whether our customers have lost their wallets, been a victim of identity fraud or looking
  Team of the Year category, 2010      for lifestyle perks, CPP can help remove the hassle from their lives leaving them free to
- Finalist in the National Insurance   enjoy life. Globally, our Life Assistance products and services are designed to simplify the
  Fraud Awards, Counter Fraud          complexities of everyday living whether these affect personal finances, home, travel,
  Initiative of the Year category,
  2009
                                       personal data or future plans. When it really matters, Life Assistance enables people to live
                                       life and worry less.
- Finalist in the European Contact
  Centre Awards, Large Team and        Established in 1980, CPP has 10 million customers and more than 200 business partners
  Advisor of the Year categories,      across Europe, North and South America and Asia Pacific and employs 1,900 employees
  2009
                                       who handle millions of sales and service conversations each year.
- Named in the Sunday Times
  2008 PricewaterhouseCoopers          In 2009, Group revenue was £292.1 million, an increase of more than 12 per cent over the
  Profit Track 100                     previous year.
- Finalists in the National
  Business Awards, 3i Growth
                                       In March 2010, CPP debuted on the London Stock Exchange (LSE).
  Strategy category, 2008
                                       What We Do:
- Finalist in the National Business
  Awards, Business of the Year         CPP provides a range of assistance products and services that allow our business partners
  category, 2007, 2009 and             to forge closer relationships with their customers.
  Highly Commended in 2008

- Named in the Sunday Times
                                       We have a solution for many eventualities, including:
  2006, 2007, 2008 and 2009
                                                - Insuring our customers’ mobile phones against loss, theft and damage
  HSBC Top Track 250 companies

- Regional winner of the National               - Protecting the payment cards in our customers’ wallets and purses, should
  Training Awards, 2007                           these be lost or stolen
- Winner of the BITC Health,                    - Providing assistance and protection if a customer’s keys are lost or stolen
  Work and Well-Being Award,
  2007                                          - Providing advice, insurance and assistance to protect customers against the
- Highly Commended in the UK                      insidious crime of identity fraud
  National Customer Service
  Awards, 2006                                  - Assisting customers with their travel needs be it an emergency (for example
                                                  lost passport), or basic translation service
- Winner of the Tamworth
  Community Involvement Award,                  - Monitoring the credit status of our customers
  2006. Finalist in 2008

- Highly Commended in The Press                 - Provision of packaged services to business partners’ customers
  Best Link Between Business and
  Education, 2005 and 2006.
  Winner in 2007

- Finalist in the National Business
                                       For more information on CPP visit:
  Awards, Innovation category,
  2005                                 www.cppgroupplc.com

    UK Wireless Network Hijacking                                                                                       October 2010

Más contenido relacionado

La actualidad más candente

Social netwoks freedom of speech-dps indrapuram
Social netwoks freedom of speech-dps indrapuramSocial netwoks freedom of speech-dps indrapuram
Social netwoks freedom of speech-dps indrapuramKarnika Seth
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in PakistanAyesha Majid
 
Cyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastCyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastMohamed N. El-Guindy
 
Hackers and hacking in bangladesh
Hackers and hacking in bangladeshHackers and hacking in bangladesh
Hackers and hacking in bangladeshTaibul Islam Tushar
 
idigf - pembangunan - mastel - kanaka hidayat
idigf - pembangunan - mastel - kanaka hidayatidigf - pembangunan - mastel - kanaka hidayat
idigf - pembangunan - mastel - kanaka hidayatIGF Indonesia
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.AbutalebFahmi Albaheth
 
Whitepapers Akamai State Of The Internet Q3 2008
Whitepapers Akamai State Of The Internet Q3 2008Whitepapers Akamai State Of The Internet Q3 2008
Whitepapers Akamai State Of The Internet Q3 2008guest1d6dd0
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsCharles Mok
 
Netpop | Pocket: Growing The Mobile Marketplace Preview
Netpop | Pocket: Growing The Mobile Marketplace PreviewNetpop | Pocket: Growing The Mobile Marketplace Preview
Netpop | Pocket: Growing The Mobile Marketplace PreviewNetpop Research
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...Yar Chaikovsky
 
Economic impacts of submarine fiber optic cables and broadband connectivity i...
Economic impacts of submarine fiber optic cables and broadband connectivity i...Economic impacts of submarine fiber optic cables and broadband connectivity i...
Economic impacts of submarine fiber optic cables and broadband connectivity i...Fola Odufuwa
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Mwando
 
Understanding the Botnet Phenomenon
Understanding the Botnet PhenomenonUnderstanding the Botnet Phenomenon
Understanding the Botnet PhenomenonDr. Amarjeet Singh
 

La actualidad más candente (19)

Oni Iran 2009
Oni Iran 2009Oni Iran 2009
Oni Iran 2009
 
Social netwoks freedom of speech-dps indrapuram
Social netwoks freedom of speech-dps indrapuramSocial netwoks freedom of speech-dps indrapuram
Social netwoks freedom of speech-dps indrapuram
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
Cyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastCyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle East
 
Hackers and hacking in bangladesh
Hackers and hacking in bangladeshHackers and hacking in bangladesh
Hackers and hacking in bangladesh
 
idigf - pembangunan - mastel - kanaka hidayat
idigf - pembangunan - mastel - kanaka hidayatidigf - pembangunan - mastel - kanaka hidayat
idigf - pembangunan - mastel - kanaka hidayat
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
Whitepapers Akamai State Of The Internet Q3 2008
Whitepapers Akamai State Of The Internet Q3 2008Whitepapers Akamai State Of The Internet Q3 2008
Whitepapers Akamai State Of The Internet Q3 2008
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two Systems
 
Netpop | Pocket: Growing The Mobile Marketplace Preview
Netpop | Pocket: Growing The Mobile Marketplace PreviewNetpop | Pocket: Growing The Mobile Marketplace Preview
Netpop | Pocket: Growing The Mobile Marketplace Preview
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
 
Economic impacts of submarine fiber optic cables and broadband connectivity i...
Economic impacts of submarine fiber optic cables and broadband connectivity i...Economic impacts of submarine fiber optic cables and broadband connectivity i...
Economic impacts of submarine fiber optic cables and broadband connectivity i...
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
 
Understanding the Botnet Phenomenon
Understanding the Botnet PhenomenonUnderstanding the Botnet Phenomenon
Understanding the Botnet Phenomenon
 
Globalpiracystudy2009
Globalpiracystudy2009Globalpiracystudy2009
Globalpiracystudy2009
 
Digital Divide 2.0
Digital Divide 2.0Digital Divide 2.0
Digital Divide 2.0
 

Destacado

Presentacion valor tesoro julio 2012
Presentacion valor tesoro julio 2012Presentacion valor tesoro julio 2012
Presentacion valor tesoro julio 2012ComunicacionesPDB
 
Presentacion valor tesoro julio 2012
Presentacion valor tesoro julio 2012Presentacion valor tesoro julio 2012
Presentacion valor tesoro julio 2012ComunicacionesPDB
 
Presentación tesoro diciembre 2012
Presentación tesoro  diciembre 2012Presentación tesoro  diciembre 2012
Presentación tesoro diciembre 2012ComunicacionesPDB
 
X2 t04 04 reduction formula (2013)
X2 t04 04 reduction formula (2013)X2 t04 04 reduction formula (2013)
X2 t04 04 reduction formula (2013)Nigel Simmons
 
C iccolella miñaqui
C iccolella miñaquiC iccolella miñaqui
C iccolella miñaquiISFD N° 117
 
Alimentation et effet de serre : nouveaux enjeux de communication
Alimentation et effet de serre : nouveaux enjeux de communicationAlimentation et effet de serre : nouveaux enjeux de communication
Alimentation et effet de serre : nouveaux enjeux de communicationMarion Barral
 

Destacado (9)

Presentacion valor tesoro julio 2012
Presentacion valor tesoro julio 2012Presentacion valor tesoro julio 2012
Presentacion valor tesoro julio 2012
 
253 publicacao09042012101719
253 publicacao09042012101719253 publicacao09042012101719
253 publicacao09042012101719
 
Presentacion valor tesoro julio 2012
Presentacion valor tesoro julio 2012Presentacion valor tesoro julio 2012
Presentacion valor tesoro julio 2012
 
Presentación tesoro diciembre 2012
Presentación tesoro  diciembre 2012Presentación tesoro  diciembre 2012
Presentación tesoro diciembre 2012
 
Mi economia
Mi economiaMi economia
Mi economia
 
X2 t04 04 reduction formula (2013)
X2 t04 04 reduction formula (2013)X2 t04 04 reduction formula (2013)
X2 t04 04 reduction formula (2013)
 
C iccolella miñaqui
C iccolella miñaquiC iccolella miñaqui
C iccolella miñaqui
 
Alimentation et effet de serre : nouveaux enjeux de communication
Alimentation et effet de serre : nouveaux enjeux de communicationAlimentation et effet de serre : nouveaux enjeux de communication
Alimentation et effet de serre : nouveaux enjeux de communication
 
Funciones de Convolución
Funciones de ConvoluciónFunciones de Convolución
Funciones de Convolución
 

Similar a Uk wireless network hijacking 2010

UK online fraud 2010
UK online fraud 2010UK online fraud 2010
UK online fraud 2010CPPGroup Plc
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?CPPGroup Plc
 
Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Frameworkanthonywong
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docxAmir Khan
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Your Smart Devices Could Be Killing You!
Your Smart Devices Could Be Killing You!Your Smart Devices Could Be Killing You!
Your Smart Devices Could Be Killing You!Robin M Austin
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
The Future of the Internet - The Next 30 Years
The Future of the Internet - The Next 30 YearsThe Future of the Internet - The Next 30 Years
The Future of the Internet - The Next 30 YearsRahul Singh
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
Cybercrime - View and perceptions from EU citizens
Cybercrime - View and perceptions from EU citizensCybercrime - View and perceptions from EU citizens
Cybercrime - View and perceptions from EU citizensGabriella Bergaglio
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)GrittyCC
 
Information Laws in Mekong Countries
Information Laws in Mekong CountriesInformation Laws in Mekong Countries
Information Laws in Mekong CountriesArthit Suriyawongkul
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityDr David Probert
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
The_SIMbox_fraud_survey.pdf
The_SIMbox_fraud_survey.pdfThe_SIMbox_fraud_survey.pdf
The_SIMbox_fraud_survey.pdfmanthanpandit1
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
Internet - History, present and future
Internet - History, present and futureInternet - History, present and future
Internet - History, present and futureMobile88
 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsMustapha Mugisa
 

Similar a Uk wireless network hijacking 2010 (20)

UK online fraud 2010
UK online fraud 2010UK online fraud 2010
UK online fraud 2010
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?
 
Security Regulatory Framework
Security Regulatory FrameworkSecurity Regulatory Framework
Security Regulatory Framework
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Your Smart Devices Could Be Killing You!
Your Smart Devices Could Be Killing You!Your Smart Devices Could Be Killing You!
Your Smart Devices Could Be Killing You!
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
The Future of the Internet - The Next 30 Years
The Future of the Internet - The Next 30 YearsThe Future of the Internet - The Next 30 Years
The Future of the Internet - The Next 30 Years
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cybercrime - View and perceptions from EU citizens
Cybercrime - View and perceptions from EU citizensCybercrime - View and perceptions from EU citizens
Cybercrime - View and perceptions from EU citizens
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
Information Laws in Mekong Countries
Information Laws in Mekong CountriesInformation Laws in Mekong Countries
Information Laws in Mekong Countries
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
The_SIMbox_fraud_survey.pdf
The_SIMbox_fraud_survey.pdfThe_SIMbox_fraud_survey.pdf
The_SIMbox_fraud_survey.pdf
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Internet - History, present and future
Internet - History, present and futureInternet - History, present and future
Internet - History, present and future
 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensics
 

Más de CPPGroup Plc

Facebook white paper2011
Facebook white paper2011Facebook white paper2011
Facebook white paper2011CPPGroup Plc
 
Anti social neighbours survey
Anti social neighbours surveyAnti social neighbours survey
Anti social neighbours surveyCPPGroup Plc
 
Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011CPPGroup Plc
 
CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011CPPGroup Plc
 
Uk lost and stolen cards 2010
Uk lost and stolen cards 2010Uk lost and stolen cards 2010
Uk lost and stolen cards 2010CPPGroup Plc
 
Corporate id fraud 2010
Corporate id fraud 2010Corporate id fraud 2010
Corporate id fraud 2010CPPGroup Plc
 
Uk regional card fraud 2010
Uk regional card fraud 2010Uk regional card fraud 2010
Uk regional card fraud 2010CPPGroup Plc
 
Lost stolen cards 2009
Lost  stolen cards 2009Lost  stolen cards 2009
Lost stolen cards 2009CPPGroup Plc
 
Uk regional card fraud 2009
Uk regional card fraud 2009Uk regional card fraud 2009
Uk regional card fraud 2009CPPGroup Plc
 

Más de CPPGroup Plc (9)

Facebook white paper2011
Facebook white paper2011Facebook white paper2011
Facebook white paper2011
 
Anti social neighbours survey
Anti social neighbours surveyAnti social neighbours survey
Anti social neighbours survey
 
Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011Mobile and SIM data - quantifying the risk - 2011
Mobile and SIM data - quantifying the risk - 2011
 
CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011
 
Uk lost and stolen cards 2010
Uk lost and stolen cards 2010Uk lost and stolen cards 2010
Uk lost and stolen cards 2010
 
Corporate id fraud 2010
Corporate id fraud 2010Corporate id fraud 2010
Corporate id fraud 2010
 
Uk regional card fraud 2010
Uk regional card fraud 2010Uk regional card fraud 2010
Uk regional card fraud 2010
 
Lost stolen cards 2009
Lost  stolen cards 2009Lost  stolen cards 2009
Lost stolen cards 2009
 
Uk regional card fraud 2009
Uk regional card fraud 2009Uk regional card fraud 2009
Uk regional card fraud 2009
 

Último

Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKISHAN REDDY OFFICE
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxAwaiskhalid96
 
1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.pptsammehtumblr
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)Delhi Call girls
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...Axel Bruns
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...narsireddynannuri1
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Tableget joys
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxjohnandrewcarlos
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfLorenzo Lemes
 
Pakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdfPakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdfFahimUddin61
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docxkfjstone13
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
28042024_First India Newspaper Jaipur.pdf
28042024_First India Newspaper Jaipur.pdf28042024_First India Newspaper Jaipur.pdf
28042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxlorenzodemidio01
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkobhavenpr
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书Fi L
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docxkfjstone13
 

Último (20)

Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptx
 
1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Table
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
 
Pakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdfPakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdf
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
28042024_First India Newspaper Jaipur.pdf
28042024_First India Newspaper Jaipur.pdf28042024_First India Newspaper Jaipur.pdf
28042024_First India Newspaper Jaipur.pdf
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 

Uk wireless network hijacking 2010

  • 1. UK Wireless Network Hijacking A CPP white paper October 2010
  • 2. Contents 2 1.1 Foreword 1.2 Industry Facts 1.3 Research methodology 1.4 Key Findings - Nearly half of home Wi-Fi networks can be hacked in less than five seconds - The majority of people mistakenly think their networks are secure - The majority of people do not think their network has been used without their permission - One in six wireless users say they regularly use public networks - It is easy to attract users to a rogue wireless network - Wireless networks are used for checking e-mails, online shopping and banking 1.5 Conclusion 1.6 Steps & Ways to Protect Yourself 1.7 Further Information 1.8 About CPP UK Wireless Network Hijacking October 2010
  • 3. Introduction 3 1.1 Foreword There is no doubt that we live in an ever increasing mobile and complicated society. If you had asked the average person in the street five years ago how their identity could be stolen, bin raiding and theft of mail would, certainly, have figured prominently. Today, ask the same question and you’re likely to get a multitude of responses including data leaks, institutional theft, bin raiding, phishing, computer viruses, malware, Trojans, botnets and so on. One area that has had little public discussion is the use of wireless or Wi-Fi networks and how secure these are. As this report highlights, without doubt, Wi-Fi networks pose a risk if they are not properly secured and visible to brute force attack. The number of people falling victim to identity fraud continues to climb; in the last industry statistics published by CIFAS, the UK’s Fraud Prevention Service, nearly 80,000 instances of identity fraud were identified by CIFAS Members in the first nine months of 2010 – an increase of nearly 10% from the same period in 2009. In the same period there was an 18% increase in the number of victims of impersonation; clearly the battle against identity fraud is just beginning and one that requires continued vigilance, perseverance, self- monitoring and management as well as help from industry and private-sector identity protection products and services. If people take a proactive approach to managing and protecting their identities they are more likely to detect and prevent an attack occurring. And if the worst should happen, Wi-Fi networks at least be able to manage the situation. pose a risk if Most recently the National Fraud Authority has published a report estimating that every year in the UK identity fraud costs more than £2.7 billion and affects over 1.8 million they are not people and of this figure at least £1.9 billion is the amount gained by the fraudster. These are staggering statistics and should be a catalyst for implementing increased properly public education and awareness and for consumers to take personal responsibility for their identities. secured and visible to brute force attack UK Wireless Network Hijacking October 2010
  • 4. 4 1.2 Industry Facts - Software security firm, Norton, reported that 65% of web users have been a victim of cyber crime (source: Computing 09 September, 2010) - In the same survey 80% of web users don’t believe the cybercriminals will be caught - Hackers have stolen up to £6 million from online bank accounts in Britain after infecting computers with a virus known as ‘zeus’ (source: Telegraph 29 September, 2010) - On 24 September, cyber-vigilantes leaked personal information relating to the download of pornographic films on the internet (source: guardian 2 October, 2010) - The police cybercrime unit can only tackle 11% of the 6,000 known organised criminal gangs that regularly use computers for illegal purposes according to the Metropolitan Police Commissioner, Paul Stephenson (source: info security 4 October, 2010) - The US leads the world in numbers of Window PCs that are part of botnets. More than 2.2 million US PCs were found to be part of botnets, networks of hijacked home computers, in the first six months of 2010 (source Microsoft BBC Technology News 13 October, 2010) Software security firm, Norton, reported that 65% of web users have been a victim of cyber crime UK Wireless Network Hijacking October 2010
  • 5. 5 1.3 Research Methodology ICM interviewed a random sample of 2,022 adults aged 18+ online between 16 - 19 September 2010. Surveys were conducted across the country and the results have been weighted to the profile of all adults. ICM is a member of the British Polling Council and abides by its rules. Further information at www.icmresearch.co.uk Separately during September 2010, CPP employed the services of an ethical hacker and Senior Vice President of CRYPTOCARD, Jason Hart, who conducted a number of reviews relating to Wireless Networks and Wireless users. The reviews were focused around Wireless WarDriving, Public Wireless Hot Spots and the use of Rogue Wireless Access Points. - WarDriving: CPP’s ethical hacker drove around each of the different cities, looking for wireless networks, using special software on a laptop computer. This was done in both residential and business areas. Following the Wardrive, CPP’s ethical hacker monitored the number of visible networks and what security settings were in place. - Public Wireless Hot spots: The second part of the experiment was to quantify the extent of security problems and raise awareness - not to ‘hunt down’ targets. The aim was to identify the number of potential users that use public hotpots within a given time frame and understand what potential sensitive information is visible across public hotspots where it could be intercepted by a nearby individual or Hacker also using wireless technology. - Creating fake wireless hubs: The third aspect of the experiment involved going into public places and creating rival wireless routers to capture people logging on to free Wi-FI. Using specialist software, CPP’s ethical hacker recorded the number of people logging-on to the rival wireless hub and what passwords and usernames they were using. The review was conducted within six cities – Bristol, Cardiff, Edinburgh, London, Manchester and Birmingham. It is important to note that at no point during this review was any unauthorised access gained to any user of any wireless network. This report (specifically the survey findings that constitute it) is intended as a reference document to highlight the potential threat that Wireless Networks and devices pose. The survey demonstrates that residential and wireless devices users within Bristol, Cardiff, Edinburgh, London, Manchester and Birmingham today should think about what they may be forfeiting by continuing to utilise wireless network technology without thinking about their online security. The report is designed to highlight and address the potential security vulnerabilities associated with using wireless systems, and to avoid being another ‘drive-by victim’. UK Wireless Network Hijacking October 2010
  • 6. 6 1.4 Key Findings Nearly half of home Wi-Fi networks can be hacked in less than five seconds In an ‘ethical hacking’ experiment conducted across six UK cities, nearly 40,000 networks were revealed as ‘high-risk’, opening up the personal data of thousands of individuals. This is because they were immediately visible to wardriving software, which puts them at direct risk from hackers, who, with the right knowledge, can override even the most secure systems. Beyond this, many networks had easily identifiable SSID or “Service Set Identifier”, which revealed the name of their business and where it was situated. City Total Total Total Total Total Total Residential Number of Number of Number of Number Number Number Networks Wireless Public Networks Using WEP using WPA Using WPA2 Networks Hotspots with No Encryption Encryption Encryption Security Birmingham 3323 340 916 403 606 998 923 Cardiff 11375 647 1409 813 1073 6494 3412 London 14908 1777 4746 2667 2554 3953 7258 Manchester 2894 650 870 793 0 1231 1663 Birmingham 3753 333 910 587 1142 836 2761 Edinburgh 1956 158 398 260 597 626 1019 CPP recruited Jason Hart, Senior Vice President of CRYPTOCard, as our ethical hacker, to conduct a Wardrive experience within the main arterial routes of each city listed above. During the Wardrive Jason was able to easily identify exposed wireless networks nearly 40,000 emanating traffic into the street. Once the wireless networks were identified – in total 38,209 – Jason pinpointed the exact frequency, estimated the location of the source, and networks were identified the Wireless ID (SSID) used. The scan also identified whether the WLAN was utilising encryption and any other apparent security characteristics of the network to revealed as determine access potential. We found that 20,110 had a good standard of Wi-FI Protected access (WPA or WPA2) providing network administrators with a high-level of assurance ‘high-risk’, that only authorised users can access the network. opening up the However, the fact that nearly 40,000 wireless networks were visible means that they cannot be considered 100% secure. Idappcom, the data traffic analysis and security personal data specialist has reported that the release of ElcomSoft’s Wireless Security Auditor (EWSA) software, recently refreshed with the addition of an enhanced WPA2 password recovery of thousands facility, is actually a ‘brute force’ cracking application, meaning that WiFi connections can be longer be considered secure. of individuals Idappcom’s chief technology officer has said “The update of EWSA means that, with the professional version installed, hackers can use a computer with up to 32 CPUs and 8 GPUs to crack WiFi encryption using a brute force attack. “Although the professional version edition costs almost $1,200, it’s reportedly possible to download a trail version of the software and crack it using utility files available via filesharing networks .” UK Wireless Network Hijacking October 2010
  • 7. 7 According to Idappcom’s CTO, the reality is that the software can brute force crack as many as 103,000 Wi-Fi passwords per second, which equates to more than six million passwords a minute – on a HD5390 graphics card-equipped PC. With regards to company’s wireless networks, the arrival of the refreshed version of EWSA means that users can no longer trust that their Wi-Fi connection – unless they use a VPN – is truly secure. There were, however, over 9,000 that had no security and a further 5,000 that had only Wired Equivalent Privacy (WEP) encryption which is the lowest form of network security and is rapidly being phased-out by businesses and organisations for more secure forms, including WPA and WPA2. The overall purpose of the Wardrive was to quantify the extent of security problems and raise awareness - not to ‘hunt down’ targets. The aim was to identify networks that emanated wireless signals excessively into a public place where it could be intercepted accidentally or otherwise (i.e. by a nearby individual or company also using wireless technology, or by a hacker). The following processes were not conducted by and were considered inappropriate or outside the scope of this Wardrive: - Sniffing of network traffic - Connection to any of the detected networks - Attempt to crack any encryption keys (WEP, WPA,WPA2) - Targeting of ‘high profile’ businesses - Installation and use of a high gain antenna - Use of ‘cracking’ software to decrypt encryption keys In addition, our ethical hacker did not check any access points for default passwords and made a special effort to make sure he did not connect to any to any of the wireless LANs that were detected. It should also be noted that the survey did not include analysis of the data packets themselves. Instead, the means of positive identification of networks were limited to the following information: - Wireless Network SSID - Wireless Network Name - Encryption type used - Wireless access point model In order to conduct the Wireless Wardrive, the following equipment was used: - Toshiba Laptop with built in Wireless Network Card - Vistumbler – A wireless network freeware scanning tool http://www.vistumbler.net UK Wireless Network Hijacking October 2010
  • 8. 8 The majority of people mistakenly think their networks are secure According to the findings, nearly a quarter of private networks in the Wardrive experiment have no password whatsoever attached, making them immediately accessible to criminals. This is despite the majority (82%) of people mistakenly thinking their network is secure. Even password protected networks are not secure. A typical password can be breached by hackers in a matter of seconds. Those aged 18-24 years old are the most (88%) likely to think their wireless network is secure verses 77% of people aged 65+. There are probably numerous reasons for this, but the overriding assumption we can make here is that this demographic are probably the least aware of the technology used and the associated level of risk, protection and threats. Men tend to be more optimistic than women with 85% thinking their wireless network is secure verse 80% of women. Q: Do you think the wireless network you use is secure? By Gender 100 85% 82% 80% 80 60 40 20 14% 12% 9% 6% 6% 6% 0 Total Male Female Yes No Don’t Know UK Wireless Network Hijacking October 2010
  • 9. 9 Q: Do you think the wireless network you use is secure? By age... 100 88% 85% 84% 84% 78% 80 77% 60 40 18% 20 12% 12% 11% 10% 10% 9% 6% 5% 5% 4% 3% 0 18-24 25-34 35-44 45-54 55-64 65+ Yes No Don’t Know The majority of people do not think their network has been used without their permission Hacking into a private network not only allows unscrupulous individuals to ‘cloak’ criminal activities such as purchasing illegal pornography or selling on stolen goods. It also allows them to view the private transactions made by individuals over the wireless network, accessing passwords and usernames, which can then be used to impersonate the victim and commit identity fraud. Worryingly, only 4% of people know for certain that their network has been used without their permission, indicating that the vast majority remain ignorant of the risk, or that this may have happened to them. Those aged 18-24 were the most likely to know for certain that their wireless network has been used by an outside party; perhaps because they are the most familiar with this type of technology and the warning signs. Nearly one in five had no idea whether their wireless had been used without their permission. UK Wireless Network Hijacking October 2010
  • 10. 10 Mark, from London: “On the day before Christmas Eve last year, I arrived home after a night out at the theatre to find that my flat door had been broken down. “Initially I thought I’d been burgled, but when I came into my home I discovered a search warrant for stolen goods and instructions to call CID. “After a very worrying Christmas period, I met with the police and was informed that they’d been acting on evidence that a stolen laptop that had been opened using my wi-fi connection. Putting two and-two together, I realized that I had no password attached to my wi-fi and that it must have been used illegally by criminals. “I was compensated for my door but obviously the episode was very worrying and made me realise just how important it is to secure your wi-fi connection.” Q: Has your wireless network ever been used without your permission...? By gender... 80 73% 72% 71% 70 60 50 40 only 4% of 30 people know 20 18% 17% 19% for certain that 10 their network 0 4% 4% 2% 4% 4% 1% 3% 4% 2% has been used Yes Total Not Applicable Male Female without their Possibly No Don’t Know permission UK Wireless Network Hijacking October 2010
  • 11. 11 Q: Has your wireless network ever been used without your permission...? By age.. 80% 80 77% 73% 74% 70 66% 65% 60 50 40 30 22% 21% 20% 20 17% 15% 12% 10% 10 7% 6% 5% 5% 4% 3% 3% 1% 1% 2% 1% 2% 2% 2% 3% 1% 2% 0 18-24 25-34 35-44 45-54 55-64 65+ Yes Not Applicable Possibly Don’t Know No One in six wireless users say they regularly use public networks This report clearly highlights the dangers of accessing the internet over publicly available networks. While 16% access Wi-Fi networks in open zones e.g. coffee shops, hotels, airport lounges, a further 20% access networks via their mobile phones that automatically connect to wireless networks. However this figure is almost certainly likely to be higher, as many smartphone users either don’t realise that their phones use wireless networks, or know that they are programmed with software which automatically connects them to free wireless networks. Those aged 18-24 were the most likely to connect to a wireless network in an open zone (21%) verses only 9% of those aged 65+. Only 22% of people said they didn’t use a wireless network, but this may not account for their mobile applications that automatically connect to Wi-Fi networks, including smartphones which are designed to connect automatically to openzones where available, often without the user being aware. In order to review the potential issues around these public hotspots, our ethical hacker, Jason Hart, visited coffee shops and public locations in six cities using basic Wireless equipped (listed below). During the review it was very easy to identify wireless users on the public hotspots and in most case catalogue sensitive data that could have been captured if needed. The data that could have been captured during the review could have been – passwords, usernames and details of the website that the user of the public hotspot was accessing. UK Wireless Network Hijacking October 2010
  • 12. 12 The overall purpose of the Hotspot review was to quantify the extent of security problems and raise awareness - not to ‘hunt down’ targets. The aim was to identify the number of potential users that use public hotpots within a given time frame and understand what potential sensitive information is visible across public hotspots where it could be intercepted by a nearby individual or Hacker also using wireless technology. We were able to ‘harvest’, but didn’t, usernames and passwords from unsuspecting people at a rate of more than 350 an hour, sitting in town-centre coffee shops and restaurants. The table below shows the number of people whose wireless networks can could have accessed across the six cities during a one-hour time period, and the level of risk with 100% of opportunities where access sensitive data was possible. City Number of people accessed within a 1 Was sensitive data visible hour time frame - Between the hours of (Were permission granted) 12pm and 1pm week days Birmingham 18 100% Cardiff 15 100% London 45 100% Manchester 27 100% Birmingham 34 100% Edinburgh 14 100% The following processes were not conducted by and were considered inappropriate or outside the scope of this Wireless Hotspot review: - Cracking of passwords - Connection to devices Those aged - Use of ‘cracking’ software 18-24 were the In addition, our ethical hacker did not access or collect any data on the devices or users. most likely to It should also be aware during the survey permission was granted from individuals to see if it was possible to retrieve sensitive information during them using Public Hotspots. connect to a In order to conduct the Public Hotspot review, the following equipment used: wireless - Toshiba Laptop with built in Wireless Network Card - A network enumeration tool (used to indentify devices on the public hotspots) network in an - Cain & Able (this was only used were permission was given by individuals) this open zone was used to capture sensitive data including passwords UK Wireless Network Hijacking October 2010
  • 13. 13 Q: Where do you use wireless networks...? By gender... 80 70% 71% 69% 70 60 50 40 30 20% 21% 20% 20 17% 19% 18% 16% 14% 14% 11% 11% 11% 10 1% 1% 1% 1% 1% 0 0 Total Male Female We were able At home While commuting/travelling to ‘harvest’, Q: Where do you use wireless networks...? By age... Through my mobile phone At family/friends/relatives house 100 At work On holiday/abroad/away from home but didn’t, Where open zones are available (e.g. coffee shops, hotels, airport lounges usernames 80 83% 81% and passwords 75% 73% from 61% 60 56% unsuspecting people at a 40 36% 37% 29% rate of more 26% 27% 21% 20% 21% 20% 20 18% 19% than 350 an 14% 14% 14% 15% 14% 10% 9% 9% 9% 6% 4% 6% hour 1% 2% 1% 3% 1% 1% 1% 2% 2% 1% 0 18-24 25-34 35-44 45-54 55-64 65+ At home While Commuting Through my mobile phone At family/friends/relatives house At work On holiday/abroad/away from home Where open zones are available(e.g. coffee shops, hotels, airport lounges UK Wireless Network Hijacking October 2010
  • 14. 14 It is easy to attract users to a rogue wireless network In order to review the potential issues around public hotspots, our ethical hacker, Jason Hart, visited coffee shops and public locations access six cities. In order to conduct this review Jason used a portable wireless network router connected to 3G broadband connection. The Wireless router was specially named to attract users to connect their wireless device to the Rogue network automatically. This was achieved by using different SSID names. During the review it was very easy to attract users to the rogue wireless network and in every case it would have been possible to catalogue sensitive data that could have been captured if needed. The data that could have been captured during the experiment could have included passwords, usernames and details of the website that the user of the public hotspot was accessing. The results below show that in just one hour, more than 200 people unsuspectingly logged onto a fake Wi-Fi network, putting themselves at risk from fraudsters, if they decided to do the same scam, could harvest their personal and financial information. In addition 80 smartphones connected automatically to the rogue network putting the holder of those devices at risk from the capture of their information, without their knowledge. This could include gaining access to personal and work emails, social networking sites or even online In just one shopping or banking sites. hour, more Elsewhere our ICM research told us that 48% of Wi-Fi users, connected to networks several times a day with nearly four out of ten connecting daily. Those aged 18-24 were than 200 the most likely to connect several times a day (62%). people unsuspectingly City Number of people accessed within a 1 hour Number of people accessed within a 1 hour Devices automatically connected to rogue logged onto a time frame with an SSID time frame with an SSID device within of a Brand Name of free Internet access a 1 hour period fake Wi-Fi Bristol 16 21 4 Cardiff 12 11 6 network, London 37 51 27 Manchester 21 32 19 putting Birmingham Edinburgh 39 9 43 15 21 7 themselves at risk from fraudsters UK Wireless Network Hijacking October 2010
  • 15. 15 The overall purpose of the rogue wireless hotspot review was to quantify the extent of security problems and raise awareness - not to ‘hunt down’ targets and to see if people would just access or trust the access point they were accessing. The aim was to identify the number of potential users that would connect to a rogue wireless hotspot within a given time frame and understand what potential sensitive information is visible publicly across public hotspots where it could be intercepted by a nearby individual or Hacker also using wireless technology. The following processes were not conducted by and were considered inappropriate or outside the scope of this Wireless Hotspot review: - Cracking of passwords - Connection to devices - Use of ‘cracking’ software Jason Hart did not access or collect any data on the devices or users. In fact, during the rogue hotspot review he made special effort to make sure that they never collected any information. It should also be aware during the survey permission was granted from individuals to see if it was possible to retrieve sensitive information during them using Public Hotspots. In order to conduct the Public Hotspot review, the following equipment used: - Toshiba Laptop with built in Wireless Network Card - Portable Wireless Access Point - 3G Broad Band USB device - Cain & Able (this was only used were permission was given by individuals) this was used to capture sensitive data including passwords UK Wireless Network Hijacking October 2010
  • 16. 16 Wireless networks are used for checking e-mails, online shopping and banking Of those respondents who use wireless networks, 85% use it for checking personal e-mails, 65% for online shopping and 63% for online banking. Women are more likely to use Wi-Fi networks for online shopping whereas men are marginally more likely to use it for online banking. Demographically, those aged 18-24 are the most likely to use Wi-Fi networks for online shopping and banking and social networking. With Wi-Fi networks open to external attack and fraudsters quietly harvesting sensitive personal and financial information, the risk of these common activities is brought into sharp focus. This is especially the case with public WI-FI networks, where many users naturally assume that the public networks they use are legitimate and therefore secure. But as these experiments demonstrate, there is nothing to stop hackers altering the name of a fraudulent network to mimic a legitimate one. Separately when we asked respondents who use Wi-Fi networks if they had ever logged onto somebody else’s unsecured wireless network without their permission, 20% said they had. People aged 18-24 were the most likely (37%) to have done this as opposed to 5% of those aged 65+. When we asked people why they had logged onto somebody else’s Wi-Fi network, over a Women are third (36%) said because it was available, 32% because it was convenient, 28% because it was easy to do, and 14% because they were having access problems with their own more likely to wireless network. 5% said they had done so accidentally highlighting the ease to which use Wi-Fi this is possible. networks for Activity Total Male Female online Checking personal emails 85% 83% 86% shopping Online shopping Online banking 65% 63% 63% 63% 67% 62% whereas men Buying or selling goods or sevices (e.g. ebay) 50% 48% 51% are marginally Social networking Transferring money (e.g. using 48% 45% 43% 45% 53% 45% more likely to PayPal Booking holidays/tickets 40% 40% 41% use it for Checking work emails 28% 30% 26% online banking Job applications Amending work documents 18% 15% 17% 14% 18% 15% General browsing 2% 2% 2% Research 1% 1% 1% News websites 0 0 1% Searching information 0 0 1% UK Wireless Network Hijacking October 2010
  • 17. 17 1.5 Conclusion Many residential homes and businesses now use wireless LAN (WLAN) connectivity because it is convenient, cheap and easy to install. They allow for mobility around the home and office and deliver great flexibility. Unfortunately, they can also be insecure unless you take appropriate precautions. Unlike wired networks, wireless signals can be intercepted and/or hijacked without the need to physically connect to the network. However the report shows that a large number of people are aware of the issues of security when it comes to deploying a wireless access home, but there still seems to be a lack of awareness in relation to what encryption standard to use when deploying or using a wireless access point and more importantly almost zero awareness when using public and or rogue wireless access points. The number of rogue hotspots in existence is extremely difficult to estimate - they exist for relatively short periods of time in order to avoid detection, and are very simple to implement and are extremely effective. There is also little need to maintain a rogue hotspot, as they rapidly yield valuable information. The recent findings of this report show that 100% of people accessed a rogue wireless access point if free wireless internet is used as the Service Set Identifier (SSID). Such fake hotspots can even process credit card details and allow internet access. This simple configuration could potentially be the next big thing in identity theft as it has a greater capacity – and yields more accurate results – than current phishing attacks. It is feasible that identities could be stolen using a system like this. Rogue wireless has the potential to be the next big criminal tool; that is providing it is not already. It is important that people are made aware of the potential risks surrounding public hotspots and that hotspots providers provide a method to reduce the risks of users by means of education and mutual authentication. The simple fact is that the vast majority of those targeted have no idea their information is visible to other people. But by capturing usernames and passwords from standard e-mail and social networking sites, a Hacker can gain access to sensitive personal and business information. Beyond this, there is nothing to stop them committing credit card fraud, applying for loans or even assuming their victims’ identities online. Wireless network hacking or “wi-jacking” is an invisible crime. Because victims often have no idea that they have been targeted until it is too late, it is extremely hard to quantify. What we can be certain of, is that the number of devices with wireless capabilities are increasing, especially with smartphones, where connectivity is automatic. Alongside this the number of internet-based applications that rely on wireless access has rapidly increased, meaning that the opportunities for wireless network hacking have also risen. Consumers need to be aware and not bury their heads in the sand because they don’t understand the technology or think it unlikely to ever happen to them. If consumers use wireless networks they should ask about security and make it their business to know the level of risk and what needs to be done to protect themselves. With over 80% confident their wi-fi networks are secure, yet with nearly half of home wi-fi networks easily hacked in less than five seconds, this is clearly not the case. The value of products to protect peoples’ identities is brought into sharp focus when you consider the evolving threat of identity fraud enabled by technological developments. UK Wireless Network Hijacking October 2010
  • 18. 18 1.6 Steps and ways to protect yourself Michael Lynch is an identity fraud expert at CPP and offers the following advice to consumers to help protect them from identity fraud. Michael is responsible for the UK Identity Protection portfolio at CPPGroup Plc (CPP). Michael has been with CPP for 14 years. His experience in financial services extends to customer service, new product and market development and affinity relationships. During his time at CPP, Michael has helped bring to market one of the UK’s market leading services, Identity Protection, which now protects over one million UK consumers from the consequences of this rapidly growing crime. In addition, Michael had used his expertise to create a commercial identity theft product aimed at protecting businesses of all sizes. He has also developed a strong understanding of consumer perception and reaction to identity theft and its consequences. In addition Michael has been responsible for breaking some major identity theft stories in the media, including the availability of fraudulent documents online, car cloning, junk mail and postal theft. Committed to forging industry co-operation to reduce the opportunities for identity theft he is leading the call for consumers to change their behaviour to counter what is becoming an increasingly sophisticated and intrusive crime. Michael is media trained across print and broadcast and is available for media interviews on the issue of identity fraud. Steps and Ways to Protect Yourself 1. Use encryption on your wireless access points (WAP) - Make sure you have Wi-Fi Protected Access 2 (WPA2) - the latest security standard introduced by global, non-profit industry association, the Wi-Fi Alliance. You can select products that use this method by looking for “Wi-Fi WPA2” in their specifications. WPA2 can operate in two modes, personal mode and enterprise mode. Personal mode – a pre-shared password or pass phrase used for authentication. This is a simple approach that ensures a computer can only get access to the WLAN if the password matches the access point’s password. Enterprise mode – a more sophisticated method that is better suited to larger organisations needing stronger protection. 2. By implementing a Virtual Private Network (VPN) you can create a secure wireless network. This is achieved by encrypting all of the data that passes over the ‘insecure’ network so that it cannot be accessed by an eavesdropper. 3. Install a firewall (an electronic barrier that sits on a network server and protects the PCs hidden behind). You can use a firewall in a network to separate an insecure part of the network from the secure area where your most critical data is managed. Businesses that have an existing Internet connection will probably have a firewall already in place, but you should not assume that this would provide protection for your WLAN. UK Wireless Network Hijacking October 2010
  • 19. 19 4. All wireless routers should have obscure IDs when they announce themselves to the world. Rather than put in any real information that can make it clear who owns the router or that can reveal your location or business name, use something common like “wireless” or “router 1” that doesn’t give away anything critical. 5. Try to position access points, which transfer data between your devices, away from the outside wall of your building to minimise leakage of radio signals. This limits the chances of interception from outside. 6. Don’t allow employees to add access points without management authorisation. One insecure access point could compromise your entire network 1.7 For further information please contact: Nick Jones Head of Communications CPP Group Plc Holgate Park York YO26 4GA Tel 01904 544 387 E-Mail nick.jones@cpp.co.uk Web www.cppgroupplc.com UK Wireless Network Hijacking October 2010
  • 20. 20 CPP is an award- 1.8 About CPPGroup Plc winning organisation: - Winner in the European Contact The CPPGroup Plc (CPP) is an international Life Assistance business offering bespoke Centre Awards, Large Team management solutions to multi-sector business partners designed to enhance their of the Year category, 2010 customer revenue, engagement and loyalty, whilst at the same time reducing costs to - Finalist in the European Contact deliver improved profitability. Centre Awards, Best Centre for Customer Service, Large This is underpinned by the delivery of a portfolio of complementary Life Assistance retail Contact Centre of the Year categories, 2010 products, designed to help our mutual customers cope with the anxieties associated with the challenges and opportunities of everyday life. - Finalist in the National Sales Awards, Contact Centre Sales Whether our customers have lost their wallets, been a victim of identity fraud or looking Team of the Year category, 2010 for lifestyle perks, CPP can help remove the hassle from their lives leaving them free to - Finalist in the National Insurance enjoy life. Globally, our Life Assistance products and services are designed to simplify the Fraud Awards, Counter Fraud complexities of everyday living whether these affect personal finances, home, travel, Initiative of the Year category, 2009 personal data or future plans. When it really matters, Life Assistance enables people to live life and worry less. - Finalist in the European Contact Centre Awards, Large Team and Established in 1980, CPP has 10 million customers and more than 200 business partners Advisor of the Year categories, across Europe, North and South America and Asia Pacific and employs 1,900 employees 2009 who handle millions of sales and service conversations each year. - Named in the Sunday Times 2008 PricewaterhouseCoopers In 2009, Group revenue was £292.1 million, an increase of more than 12 per cent over the Profit Track 100 previous year. - Finalists in the National Business Awards, 3i Growth In March 2010, CPP debuted on the London Stock Exchange (LSE). Strategy category, 2008 What We Do: - Finalist in the National Business Awards, Business of the Year CPP provides a range of assistance products and services that allow our business partners category, 2007, 2009 and to forge closer relationships with their customers. Highly Commended in 2008 - Named in the Sunday Times We have a solution for many eventualities, including: 2006, 2007, 2008 and 2009 - Insuring our customers’ mobile phones against loss, theft and damage HSBC Top Track 250 companies - Regional winner of the National - Protecting the payment cards in our customers’ wallets and purses, should Training Awards, 2007 these be lost or stolen - Winner of the BITC Health, - Providing assistance and protection if a customer’s keys are lost or stolen Work and Well-Being Award, 2007 - Providing advice, insurance and assistance to protect customers against the - Highly Commended in the UK insidious crime of identity fraud National Customer Service Awards, 2006 - Assisting customers with their travel needs be it an emergency (for example lost passport), or basic translation service - Winner of the Tamworth Community Involvement Award, - Monitoring the credit status of our customers 2006. Finalist in 2008 - Highly Commended in The Press - Provision of packaged services to business partners’ customers Best Link Between Business and Education, 2005 and 2006. Winner in 2007 - Finalist in the National Business For more information on CPP visit: Awards, Innovation category, 2005 www.cppgroupplc.com UK Wireless Network Hijacking October 2010