“The Travelers Guide To Wi-Fi Hacking”

  • 0

“The Travelers Guide To Wi-Fi Hacking”

Dear Blast Reader,

Do you stay at hotels when you travel? Do you ever use the hotel internet? Did you know that there may be someone spying on you while you are in your hotel? Did you know that hackers target hotel Wi-fi? Did you know that the hackers that target hotel wi-fi also target traveling business professionals?

 

Hotel wi-fi is targeted and compromised to assist in the delivering of the malicious payload to the selected victims. A ­payload is the part of the malware that performs the malicious action. Those behind the attack continually evolve the malware’s tactics and payload. It is believed that the attackers are exploiting the vulnerabilities in the server software, either by:

  • Gaining remote access.
  • Physically gaining access to the hotel and the hotel’s servers.

 

Now, attackers are using a new form of malware known as the “Inexsmar Attack”. This attack starts with a phishing email.  To make the email look real, the message is tailored to you. This email address you by name, and has real looking documents attached.

 

But, looks can be deceiving. Within this email there is a self-extracting archive package. This is a package that begins the trojan downloader process. A trojan downloader process is a malicious program, usually installed through an exploit or some other deceptive means. Using email attachments the malware is installed onto your computer. Once you are convinced to open the attachment, hackers will then initiate their malware attack.

 

How does the malware go un-detected?

To prevent being detected, the malware is downloaded in stages. These stages include:

  1. Hiding malicious codes and strings by linking malicious code to otherwise unrelated code.
  2. The malware then runs an operation to download the second part of the payload, the trojan malware.

 

So, as your defences improve, it is believed that the multi-stage download for the trojan malware is an evolutionary way to keep the trojan viable.

So, how do you protect yourself?

To protect yourself against this new form of advanced and evolutionary trojan malware, here are a few tips:

  1. Use public wi-fi as little as possible. Hackers exploit public wi-fi in places like coffee shops, restaurants, and hotels.
  2. Use a Virtual Private Network, also known as a VPN. VPNs are encrypted web browsers that hide your IP addresses & your location.

 

If you have any questions about Hacking, Malware, Cyber Security, or Computer Forensics contact FDS Global. You can reach us at our office at (954) 727-1957 or by email at RMoody@FDS.Global. Please feel free to visit out website at www.FDS.Global.


  • 0

“The Great Wi-Fi Siege”

It has become routine for the working population to frequent restaurants, bookstores, and coffee shops with “FREE WI-FI”. Often there is a sign brightly lit or well displayed offering this fantastic amenity. How many times have you been out in public and had the ability to access the Internet? The chances are you likely seized this opportunity. Whether you connected to this free Wi-Fi to get some quick work done, read an important email, or just checking your social media pages you have put yourself at risk.

 

With “Free Wi-Fi” becoming more prevalent, new threats and risks for the average consumer are arising. Scammers, Skimmers, and Hackers all are benefiting from unassuming individuals connecting to Free Wi-Fi Hot Spots. While these public Wi-Fi spots are convenient, a third-party who happens to be in range can hack your computer by accessing the same Internet connection as you.

 

Additionally, there are devices that exist that can mimic Wi-Fi signals. An example of this device is called a Wi-Fi Pineapple. This device broadcast a Wi-Fi signal with the same name as a public Wi-Fi.  Hackers can load malicious software on connecting computers. The use of this device is an example of a very common way to hack a persons computer or phone.

 

The three most common attacks that can happen on public Wi-Fi are:

 

  1. Man-in-the Middle attacks – This happens when an attacker places their own network in between your computer and the one you are accessing, thus all your information is routed through their device.
  2. Malware – This can give the attacker access to everything on your device, including files and photos. Malware can even give attackers the ability to turn on your cameras and microphones without you knowing, letting them eavesdrop into your personal life.
  3. Wi-Fi sniffing – This involves the attacker recording large amounts of data as it all passes through the network and allows them to sift through it later for useful information.

 

When using public Wi-Fi it is important to remember that you should not do anything that involves personal passwords, sensitive account or credit card information, or any personally identifiable information such as social security numbers.

 

Even seemingly harmless activities on your computer, such as online shopping, can give attackers access to more data than you would be willing to share and give them the access to your bank account and credit card numbers.

 

There are ways you can protect your information and be safe while using Public W-Fi networks:

 

  1. Make sure you are connecting to a legitimate network, “If you don’t know who is running the network, then you probably shouldn’t use it.”
  2. Never access your bank account or any other sensitive information.
  3. Disable your devices from automatically connecting to Wi-Fi wherever it is available, this way you have more control of what networks you allow.
  4. Use a VPN, or virtual private network, this can help protect your data with a strong encryption making it less convenient for the hackers.

 

If you have any questions about security concerns, feel free to call FDS Global. We have a specialized team of Cyber Security Investigators and Hacking Investigators. Visit our website at www.FDS.Global or give our office a call at (954) 727-1957.