evil twin (wireless networks)

{{Short description|Method used to facilitate phishing}}

{{refimprove|date=July 2016}}

thumb

An evil twin is a fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications.{{cite news|author=Smith, Andrew D.|title= Strange Wi-Fi spots may harbor hackers: ID thieves may lurk behind a hot spot with a friendly name|work= The Dallas Morning News|publisher= Knight Ridder Tribune Business News|location= Washington, DC|date=9 May 2007| page= 1| url= http://cloud-computing.tmcnet.com/news/2007/05/09/2597106.htm|accessdate= 6 June 2007}}

This type of attack, also known as a man-in-the-middle attack, may be used to steal the passwords of unsuspecting users, either by monitoring their connections or by phishing, which involves setting up a fraudulent web site and luring people there.{{Cite news|author=Wolfe, Daniel|title=Security Watch|work=American Banker|location=New York, NY|date= February 14, 2007|volume= 172|number= 31|pages= 7|issn=0002-7561|quote=A security firm used an evil twin as a test to obtain passwords from attendees at an RSA security conference|id={{ProQuest|249873579}}}}

Method

The attacker snoops on Internet traffic using a bogus wireless access point. Unwitting web users may be invited to log into the attacker's server, prompting them to enter sensitive information such as usernames and passwords. Often, users are unaware they have been duped until well after the incident has occurred.

When users log into unsecured (non-HTTPS) bank or e-mail accounts, the attacker intercepts the transaction, since it is sent through their equipment. The attacker is also able to connect to other networks associated with the users' credentials.

Fake access points are set up by configuring a wireless card to act as an access point (known as HostAP). They are hard to trace since they can be shut off instantly. The counterfeit access point may be given the same SSID and BSSID as a nearby Wi-Fi network. The evil twin can be configured to pass Internet traffic through to the legitimate access point while monitoring the victim's connection,{{cite web|title=Evil Twin with internet access via legitimate access point : Proof of concept|url=http://www.kalitutorials.net/2014/07/evil-twin-tutorial.html|website=kalitutorials.net}} or it can simply say the system is temporarily unavailable after obtaining a username and password.{{cite news|author=Crossman, Craig|title=Computer Column|publisher= Knight Ridder Tribune Business News|location= Washington, DC|date= 24 August 2005}}{{cite news|url=https://www.networkworld.com/article/831134/lan-wan-evil-twin-wi-fi-access-points-proliferate.html|author=Kirk, Jeremy|title=′Evil Twin′ Hotspots Proliferate|work=Network World|publisher=IDG News Service|date= April 25, 2007}}{{cite news|work=CNN|url=http://www.cnn.com/2005/TECH/internet/01/20/evil.twins/ |title='Evil twin' threat to Wi-Fi users|date= January 20, 2005}}{{cite news|url=http://www.pcworld.com/news/article/0,aid,120054,00.asp|title=Does Your Wi-Fi Hotspot Have an Evil Twin?|date=March 15, 2005|author=Biba, Erinwork|work=PC World|access-date=February 4, 2010|archive-date=August 20, 2008|archive-url=https://web.archive.org/web/20080820182656/http://www.pcworld.com/news/article/0,aid,120054,00.asp|url-status=dead}}

Using captive portals

One of the most commonly used attacks under evil twins is a captive portal. At first, the attacker would create a fake wireless access point that has a similar ESSID to the legitimate access point. The attacker then might execute a denial-of-service attack on the legitimate access point which will cause it to go offline. From then on, clients would connect to the fake access point automatically. The clients would then be led to a web portal that will be requesting them to enter their password, which can then be misused by the attackers.

Example

In July 2024 a man was charged by Australian Federal Police with running a fake WiFi network to steal credentials of passengers on at least one commercial flight.{{Cite news |title=Police allege ‘evil twin’ of in-flight Wi-Fi used to steal passenger’s credentials |url=https://www.theregister.com/2024/07/01/australia_evil_twin_wifi_airline_attack/ |last=Sharwood |first=Simon |date=2024-07-01 |access-date=2024-07-02 |work=The Register}} An airline had reported that employees had concerns about a suspicious WiFi network identified during a domestic flight.

See also

References

{{reflist}}