Week 1 Wireless and Mobile Device Attacks Writeup
Week 1 Wireless and Mobile Device Attacks Writeup
Wireless networks have made life easier, especially during the COVID-19 pandemic, when schools
closed and learning and teaching from home became the new norm. However, they are susceptible
to attacks that can cause great harm to a device and the user.
Wireless Attacks
Wireless network attacks are deliberate and malicious actions aimed at exploiting vulnerabilities in
wireless communication systems to gain unauthorised access, intercept sensitive data, disrupt
network operations, or compromise the security of devices and users connected to the network. An
example is a rogue access point.
Below is a list of common weaknesses a threat actor can take advantage of:
1
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
source: SSID
Wi-Fi devices such as access points and home routers come with default credentials. Depending on
the brand, default credentials are the same across these devices. This makes it easy for an attacker
to compromise a wireless network by logging in and taking over the router, loading malicious
scripts, or redirecting network traffic to their server. An attacker can steal user information, such as
bank details or the identity of a user, and use it for fraudulent activities or sell it on the dark web.
Default usernames and passwords must be changed immediately to prevent a hacker from accessing
the wireless network.
2
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
2. Access Point Location
An access point should not be in a place where it is easily accessible. An attacker, in a matter of
seconds, can revert the access point to default settings and set the configurations to redirect traffic
to them.
1. War-driving
It is also referred to as access point mapping. This is the act of looking for wireless networks by
moving around a town or city using a GPS device while recording the location of wireless networks.
The information is then uploaded to a website to digitally map the networks in that area.
3
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
An example of War-driving mapping
Source: secjuice.com
2. Jamming
This is also known as network interference. It is a method of attack that involves intentionally
disrupting wireless communication systems such as Wi-Fi, Bluetooth, GPS systems, and cellular
phones. Its primary goal is to disrupt the network. The interference can be either intentional or
unintentional, and it can target specific frequencies, channels, or devices. An attacker can combine
jamming techniques using a variety of methods, including emitting noise, spoofing signals, and
exploiting protocol vulnerabilities. To confirm whether you are experiencing wireless jamming, scan
the wireless environment with various tools such as spectrum analyzers, network monitors, or
jamming detectors to identify the source and type of interference. To prevent this attack, make sure
to use strong encryption protocols like WPA2 or WPA3. Additionally, users can also set up the router
to use different frequencies, 2.5 GHz and 5 GHz.
4
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
3. Rogue Access Points
A rogue access point is an unauthorised access point that an individual has set up without informing
the network administrator. A wireless access point is easy to install. Using a Windows machine, a
user can create a wireless network. However, these access points are not protected, so they can
easily be hacked, or an attacker can create one to entice valid users away from their corporate
network and capture the traffic.
Two high school students in New Jersey, hacked into the school Wi-Fi and brought down all the
network services. The attack paralysed all online activities at the school. The staff could not
access the school systems, and the students could not access their work and classes. The two
students conducted the hack simply because they did not want to sit for an exam.
Videos demonstrating the dangers of connecting to an insecure Wi-Fi network:
● Hacker Demonstrates Security Risks Of Free Public Wi-Fi
● What happens when you connect to an unsecured public Wi-Fi network?
5
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
4. Evil Twin Access Points
An evil twin attack occurs when an attacker creates a fake Wi-Fi access point in the hopes that users
will connect to it rather than a legitimate one. When users connect to this access point, all
information they share with the network is routed through a server controlled by the attacker.
source: darkreadings.com
An attacker captures incoming and outgoing packets in the network traffic and reads information
sent between the sender and the receiver. Most information sent is in plaintext, and no form of
encryption is in use. Through packet capture analysis, a threat actor can acquire sensitive
information such as passwords, usernames, and credit card information. There are tools used for
this, including Wireshark, Ettercap, BetterCAP, TCPdump, and WinDump.
6
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
Source: gourav-dhar.com
6. War shipping
This comes from the term ‘package shipping’ which is common in online shopping websites such as
eBay, Amazon or Jumia. An attacker sends a package with malicious hardware to the physical
address of a target, for example, school premises or home, using shipping services. The attacker
gains remote access to the hardware and uses it to carry out an attack.
source: forbes.com
7
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
Wireless Attacks Scenarios
1. A 12-year-old student at Baker County Middle School hacked the school’s Wi-Fi because he
did not want to go to school. The student shut down the school’s phone lines and internet.
● Baker Co. student could face felony for reportedly hacking school's WiFi to avoid
doing school work
2. Amazon CEO Jeff Bezos' phone was allegedly hacked by a Saudi Crown Prince in 2018.
● The Jeff Bezos phone hack
3. Colleges are turning students’ phones into surveillance machines, tracking the locations of
hundreds of thousands.
● Colleges are turning students’ phones into surveillance machines, tracking the
locations of hundreds of thousands
4. Russian agents camped outside hotels to try to hack victims remotely
● How Russian Spies Infiltrated Hotel Wi-Fi to Hack Victims Up Close
8
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
2. Outdated security standard. The recommended standard is WPA3, which is more secure.
9
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
10
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
Mobile Device Attacks
1. App-based
Applications available on platforms such as the Play Store and App Store have made the smartphone
experience better. However, it is difficult to detect a malicious app because it may look genuine on a
download site. A legitimate application can also be exploited for fraudulent intentions.
2. Web-based
Mobile devices can connect to the internet and access web services such as banking services, school
websites, staff portals, and learning management systems. When a user visits a malicious site,
malware can be automatically downloaded to the device without the user’s knowledge.
3. Network-based
Mobile devices support Wi-Fi and Bluetooth technologies. An attacker can take advantage of this
when a user leaves Bluetooth enabled or connects to an unsecured Wi-Fi network and installs
11
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
malware. An attacker makes use of any weakness present in an application or operating system
(Windows, Android, or iOS) to install harmful code.
4. Physical
This involves the loss of a mobile device to an attacker. Sensitive information on the phone is
vulnerable, as the attacker has full access to the physical device. A threat actor can also get into your
institution’s network using your identity and cause havoc.
1. Malware
malicious software that targets computers, tablets, and smartphones in an attempt to obtain private
information or take over the device. It can take many forms, for example:
● Adware
An attacker attempts to flood malicious and unwanted advertisements onto a user’s computer or
smartphone. Adware can be used to collect data, redirect to malicious sites, or change your
browser’s settings. The danger of adware is that data collected can be sold in the dark market and
used for identity theft
source: Adware
12
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
● Browser exploit
Mobile browsers are not completely safe. Therefore, an attacker can take advantage of its weakness
and change browser settings without your knowledge. An example of an application that works in a
browser and abuses this is PDF Reader.
● Banking Trojan
This is a specific type of trojan horse designed to gain access to sensitive data stored or processed
by online banking systems. They appear as backdoor trojans, which exploit backdoors in your
system to bypass security measures and gain access to your computer, as well as spoofers, who
obtain user credentials by impersonating a financial institution's login page.
The attackers' primary goal is to steal banking credentials, conduct unauthorised transactions, and
syphon funds into the attacker's account.
13
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
● Spyware
Hackers use spyware to track the online activities of users without their knowledge or consent. It
can spread easily by exploiting a weakness in a software application. It can acquire information
through activity monitoring, collecting keystrokes (keyboard inputs), and harvesting account
information such as logins and financial data.
Source: Spyware
14
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
2. Phishing
A cyberattack occurs when an attacker tries to get information from a user by disguising themselves
as a trusted entity and tricks the user into giving sensitive information such as a username and
password. This can be done through an email, instant message, phone call or text message.
● Clone phishing
This is a sophisticated email-based threat in which attackers create a nearly identical copy of a
legitimate email, text, social media account, or website from a reputable organisation. They then use
email spoofing techniques to make the message appear to be from a reputable organisation. These
"clone" emails have attachments that look similar to the originals; however, they contain malware
capable of stealing sensitive user information such as financial information, usernames, and
passwords.
Image: webroot.com
15
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
● Spear phishing
This is an attack that targets a specific organisation or individual. The reason it is successful is the
attacker's extensive reconnaissance of their intended target. The information gathered can then be
used to create a tailored attack.
● SMiShing
This attack uses Short Message Services (SMS) to send malicious or fraudulent texts or links. The
attacker tries to acquire information when the user clicks on the malicious link. A user can also
receive a text message that looks like it is from a trusted source. The attacker, however, through the
convincing text message, is trying to trick you into providing confidential information.
source:devfuzion
● Vishing
Also known as voice phishing. An attacker attempts to trick a person into giving up sensitive
information by providing a convincing fictional story. This is conducted through phone calls using
mobile phones or VoIP devices.
16
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
Source: infosysblogs.com
3. Bluetooth Technology
This technology is used for short-range wireless communication that came into existence
before Wi-Fi. Devices connected to Bluetooth include speakers, headphones, microphones,
digital cameras, and computers. It operates within a range of 10 metres.
17
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
Bluetooth Exploits
18
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
2. Bluesnarfing
This attack is where an attacker gains unauthorised access through a Bluetooth connection to a
Bluetooth-enabled device without the owner's knowledge by exploiting a firmware flaw in older
devices. It happens when the device's Bluetooth is set to discoverable mode, making it vulnerable.
This attack coerces a Bluetooth device to connect, allowing access to its data and IMEI
(international mobile equipment identity). The IMEI, a unique identification number assigned to
each device, could be used to route all incoming calls from the user's device to the attacker's device.
Additionally, the attacker may illegally download data from the device, such as emails, phone
numbers, and photos.
3. Bluebugging
This attack is similar to bluesnarfing but is more damaging. In this attack, the attacker gains access
to the device, takes over, and gains full control of the device. This means they can access the
phonebook, make phone calls, send messages and emails, and even set up call forwarding to receive
the victim's phone calls without the victim's knowledge.
4. Blue Borne
Attackers use Bluetooth to gain complete control of a device, be it Android, iOS, Windows, or Linux.
It does not require an internet connection or human interaction. It affects computers, mobile
phones, and IoT devices (smart cars and wearables). The attack does not require that the targeted
device be paired with the attacker's device or set to discoverable mode. As long as your Bluetooth is
on and you are in the vicinity of an already infected device, the virus can easily be transferred to
your device without asking for permission.
19
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
6. Do not accept pairing requests on Bluetooth from strangers
7. Connect to secure Wi-Fi networks only and avoid using public Wi-Fi
8. Beware of malicious downloads or links
9. Encrypt your data using encryption tools such as ZealCrypt and Crypto
10. Install anti-virus software for your device
11. Install an ad-blocking application such as Adblock Plus, Ad-Blocker or AdGuard
WhatsApp is currently the most used application for communication. Teachers around the globe use
it to conduct online classes and pass information to students and their parents or guardians. You
can secure your WhatsApp account through the following tips:
Never share your registration code or two-step verification PIN with others
● Enable two-step verification and provide an email address in case you forget your PIN
● Set a device code
● Be aware of who has physical access to your phone (If someone has physical access to your
phone, they can use your WhatsApp account without your permission.)
20
ADVANCED CYBERSECURITY TRAINING FOR TEACHERS (ACTT)
Additional Reading Material on WhatsApp Security
21