Welcome to IT 101, where the experts at 2W Tech will tackle a hot topic in the IT industry and break it down for educational purposes. This week we cover types of wireless network attacks.

Wireless networks are convenient, but they leave you and your operations susceptible to a variety of external threats. Here are a few of these attacks and the havoc they could cause if they penetrate your security system:

  • Rogue APs – Using ID number configurations doesn’t necessarily prevent wireless networks from being monitored. This is what allows threat actors to take advantage of rogue access points. Any wireless access point added to your network that has not been authorized is considered rogue. The rogue may have been added by an attacker, or it could have been added without malicious intent by a user looking to enhance the environment. Oftentimes, a user will not implement the same level of security the previous administrator did, which could open up the system for a man-in-the-middle attack or evil twin attack.
  • Evil twin attack – This attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit.
  • Jamming – Interference can be unintentional, but when it is intentional, it is referred to as jamming. The intent is to jma the signal and keep the legitimate device from communicating. Powerful jammers are available that send a constant signal and, if in the right vicinity, can incapacitate a network quickly. Since they are so strong, these constant jammers are usually easily detected.
  • WPS attacks – Especially used on small office and home office routers, WPS attacks have become common because the technology is susceptible to brute-force attacks to guess the user’s PIN. Once an attacker gains access, they are then on the Wi-Fi network.
  • Bluejacking – This is the sending of unsolicited messages (akin to spam email) over a Bluetooth. Often annoying, but rather harmless.
  • Bluesnarfing – Bluesnarfing is the gaining of unauthorized access through a Bluetooth connection. This access can be obtained through a smartphone or any Bluetooth device. Once an actor has gained access, they can copy data in the same way they could with any other type of unauthorized device.
  • Disassociation – With this type of attack, the intruder sends a frame to the AP with a spoofed address to make it look like it came from the victim and disconnects them from the network. Since the victim is unable to keep a connection with the AP, it increases their chances of choosing to use another AP – a rogue one or one in a hotel or other venue they have to pay to use.

Even wireless network connections are susceptible to being attacked. Make sure your operations are protected. Contact 2W Tech today to get started with your Cybersecurity Compliance Program and let our IT consultants do the work for you.

Read More:

Ransomware Attacks May Not Be Covered By Traditional Insurance Policies

Microsoft Teams Will Add Push-to-talk Walkie Talkie Feature

Back to IT News