Summer brings with it heat waves but also new hacker attacks, designed to take advantage of the less attention of victims at this time of year. Among these, one of the most used, and with the highest percentage of engagement, is called Evil Twin: it is a hacker attack which induces users to connect to a fake Wi-Fi access point since it mimics a legitimate network. Let’s find out the details together.
Massimo GrandessoManaged Detection & Response BL Manager di Innovery, explains specifically what these Evil Twin attacks are. Grandesso stated:
Evil Twin attacks get their name from their ability to mimic legitimate Wi-Fi networks, such as that of a coffee shop, airport, public park, and are nearly impossible to identify. Once the user connects to the malicious network he will find himself completely at the mercy of the criminal, who will have access to all the pages on which the victim will browse.
If from an illegitimate network, for example, we were to access our bank account, or work network, all this data could easily be hacked, including company credentials. This type of attack is not limited to just computers but any tool that connects to the wireless network, such as mobile phones and tablets, is vulnerable.
This means that public WiFi networks e hotspot they may be the new preferential attack vector for cybercriminals. Evil Twin bindings are simple to make, and don’t require particularly sophisticated technical skills. It also appears that this type of attack has a high success rate.
A hacker simply has to search for a known location with free WiFi, take note of the SSIDe set up a new account with the same name. As with legitimate networks, the hacker will set up a page “captive portal”where the user enters a password the altar basic information to access the network.
Once the bogus login page setup is done, the hacker can bring your device closer o router to potential victims to create a stronger signal. By doing so, he will be able to convince the victims to choose your network than weaker ones, and force some devices to connect automatically. Unfortunately, it’s nearly impossible to distinguish between a legitimate and a fake captive portal page.
It is very difficult to detect this type of attack; however, you can pay attention to what you do and therefore try to safeguard yourself. We report them below.
Apple He released iOS 16 Beta 5 to the testers, who will verify the stability…
PG Esportsin collaboration with Be Italianannounces that Roberta “Ckibe” risesstreamer and well-known face of the…
The NVIDIA company today announced preliminary financial results for the second quarter of fiscal 2022…
In this third part, our guide will conclude its section of arenas and scenarios taken…
It is more evident than ever how it is absolutely appropriate to start your investment…
Understanding how to flirt online doesn't mean learning a set of specific techniques and "moves".…