News

Wi-Fi a Welcome Mat for Attackers, Study Finds

AirTight, a provider of Wi-Fi security services, recently scanned 3,632 access points (APs) and nearly 550 clients in seven different financial centers and found that half of these WPAs were either open (unprotected) or used WEP encryption.

The test sites were in New York, Chicago, Boston, Philadelphia, Wilmington (Del.), San Francisco and London.

Lest you dismiss the issue as one of rogue access points or isolated consumer WPAs that were caught up in AirTight's dragnet, 39 percent of so-called "threat-posing" APs could be classified as "enterprise-grade." In many cases, AirTight reported, enterprise-grade APs that could have been configured to support the more robust WPA or WPA2 protocols were instead protected with WEP. AirTight was also careful to distinguish between known or popular open APs -- such as those associated with hotspots -- and enterprise-grade implementations.

In any given financial district, AirTight reported, 13 percent of mobile Wi-Fi clients are configured to operate in ad hoc mode, which makes them vulnerable to wi-phishing or "honeypotting" attacks, researchers pointed out.

AirTight found that 61 percent of open access points were consumer- or SOHO-grade devices. It doesn't strictly associate the use of these devices with home or SOHO scenarios, however; in some cases, these devices are deployed by "impatient" or reckless employees who, frustrated by the slowness of in-house Wi-Fi rollouts, plug rogue (typically consumer) APs into enterprise networks to perpetrate "back-door" schemes.

Moreover, AirTight reported, some enterprises seem to assume that simply obfuscating an AP's SSID is protection enough: 79 of open APs with hidden SSIDs were powered by enterprise-grade devices.

The AirTight report revealed a disappointingly low rate of WPA2 adoption -- just 11 percent, on average. Compare that with WEP, which is used by fully one-third of Wi-Fi networks in the surveyed financial districts. This is in spite of the fact that WEP cracking can take less than five minutes, AirTight researchers caution.

Moreover, AirTight noted, just under a third (32 percent) of Wi-Fi networks use WPA, which is also known to be vulnerable.

About the Author

Stephen Swoyer is a Nashville, TN-based freelance journalist who writes about technology.

comments powered by Disqus

Featured

  • How to Unlock Visual Studio 2022's Preview Features Like Claude Sonnet 3.7 AI Model

    Some developers complained that advanced AI models come sooner to VS Code than Visual Studio, but the new Claude Sonnet 3.7 model is now available in IDE with a paid GitHub Copilot account and a simple settings tweak in GitHub.

  • Semantic Kernel Agent Framework Graduates to Release Candidate

    With agentic AI now firmly established as a key component of modern software development, Microsoft graduated its Semantic Kernel Agent Framework to Release Candidate 1 status.

  • TypeScript 5.8 Improves Type Checking, Conditional Feature Delayed to 5.9

    Microsoft shipped TypeScript 5.8 with improved type checking in some scenarios, but thorny problems caused the dev team to delay related work to the next release.

  • Poisson Regression Using C#

    Dr. James McCaffrey from Microsoft Research presents a complete end-to-end demo of Poisson regression, where the goal is to predict a count of things arriving, such as the number of telephone calls received in a 10-minute interval at a call center. When your source data is close to mathematically Poisson distributed, Poisson regression is simple and effective.

  • Cloud-Focused .NET Aspire 9.1 Released

    Along with .NET 10 Preview 1, Microsoft released.NET Aspire 9.1, the latest update to its opinionated, cloud-ready stack for building resilient, observable, and configurable cloud-native applications with .NET.

Subscribe on YouTube

Upcoming Training Events