The Reason WiFi Hacking is a Scary Threat to Your Business - Tubblog: The Hub for MSPs

The Reason WiFi Hacking is a Scary Threat to Your Business

The Reason WiFi Hacking is a Scary Threat to Your Business image

The Reason WiFi Hacking is a Scary Threat to Your BusinessDo you ever consider the threat posed by WiFi Hacking?

As the former owner of a Managed Service Provider (MSP) business, and somebody who has worked in the IT industry all my life, I consider myself quite cybersecurity savvy.

However, I realised I had become complacement in connecting to public WiFi hotspots.

And then, I started to become aware of the very real dangers of connecting to an unfamiliar WiFi signal.

Divider

Can you really trust free WiFi?

The dangers of connecting to a free WiFi signal hit home for me a few years ago, when my wife and I were staying at a very nice Airbnb.

Free WiFi was provided by the owners, and shortly after we arrived, my wife and I needed to log in to our online banking to make a funds transfer.

I opened my laptop and logged onto the Airbnb provided WiFi.

Then, I opened a web browser and went to log on to our online banking when the thought suddenly hit me.

While I was treating the Airbnb WiFi as trustworthy and reliable — how did I really know that?

The truth hit me that, in reality, I couldn’t trust the WiFi and so needed to err on the side of caution.

As a result, since that time, I’ve taken my WiFi security seriously.

And if you don’t think the threat of WiFi security applies to you, I’d encourage you to read on…

The Reason WiFi Hacking is a Scary Threat to Your Business

Divider

A Demonstration of WiFi Hacking

Business owners are told that WIFI hacking is a real danger to their business, but if you see how it’s done, it really brings it home.

Here, Privatise employee Claudia (‘the hacker’) demonstrates a live hack, and it makes for fascinating (albeit scary) viewing!

Divider

How a WiFi Hacker Works

WIFI data is sent as easily-intercepted radio waves, and hackers use interception tools.

One such interception tool (the one seen in the demo above), a WiFi Pineapple, is cheap to buy and is frequently used by cybersecurity professionals.

Although there are several ways a hacker can compromise your system, the ‘hacker’ in this demo clones the wireless network and sets up an evil twin.

WiFi Data

The hacker achieves this by firstly doing a site survey.

A site survey scans for and displays not only the wireless networks available, but the devices looking to connect to a wireless network.

As a result, the top four lines of code you’ll see in the video represent four open networks in the region of the hacker’s computer.

Within the pineapple interface, the ‘hacker’ creates a fake wireless access point that mimics one of the available networks.

This fake access point is created in the hopes that victims will connect to it.

In the ‘open SSID’ section of the video, the hacker enters one of the networks found in the site survey, reduces the maximum number of clients to five and then updates the access points before saving the configuration.

The pineapple’s radius restarts, emitting the cloned fake access point.

As you can see in the video demo, a phone and a tablet are used instead of a real client, and these are shown as connected in the dashboard.

NB: during the course of this demo, the ‘hacker’ ensured that no other devices could connect to the cloned network.

WiFi hackers can gain use a $99 device called the 'Pineapple' to gain access to your personal data. Here's how. Click to Tweet

Divider

The ‘Evil Twin’ Hack

Evil Twin WiFi Hack
The Evil Twin WiFi Hack. How do you know which WiFi Access Point is real?

The ‘hacker’ runs a second site survey, and in the demo, you’ll see that the network addresses are on two different channels, but with the same Service Set Identifier (SSID).

If you look closely, you’ll see that the BSSID (MAC address) is different, but it can be spoofed to make it look exactly like the original network!

The real danger of connecting to an evil twin access point is that the ‘hacker’ can now see all the traffic coming through his network from the victim’s devices using a TCP dump.

In the demo video, traffic from the devices connected to the cloned network is visible, including from Facebook, YouTube and other sites.

The ‘hacker’ saves all of this information to review and exploit at a later date.

The Reason WiFi Hacking is a Scary Threat to Your BusinessDivider

Potential Damage from a WiFi Hack

In the video, the split screen shows the victim’s computer, a PC running Windows 10 and Chrome, on the right.

On the left, the ‘hacker’s’ computer is intercepting WIFI data via the pineapple.

The ‘hacker’ has added a ‘man in the middle’ proxy, which sits between the victim’s computer and the web and reads information from the victim’s machine.

WiFi Hacker

The victim logs on to an Apple account, an Amazon Web Services management console and a WordPress admin area with their usual usernames and passwords.

It appears to the user that the sign-in has failed, but his information has successfully been captured on the hacker’s computer.

The ‘hacker’ then closes the hack session, the victim returns to a regular session and is able to log in as usual.

As a result, the user is none the wiser that their username and password have been stolen!

The reality is that their login details have been syphoned off and entered onto the ‘hacker’s’ network to be used at their convenience.

In five minutes, we’ve watched an extremely successful hack quickly set up and at minimal cost.

However, the victim may only find out they’ve been hacked at a later date when their compromised data is used.

Divider

How Can You Avoid WiFi Hacking?

If the above scenario scares you (and it should do!) then you’re not alone.

How many hotel, coffee shop, pub or other public WiFi hotspots have you connected to under the assumption they are secure?

As a result of watching the video, you may be wondering how you can stay safe using WiFi.

The quickest method would probably be to avoid using free WiFi.

Instead, rely on connecting to the Internet via your smartphone’s 4G or 5G connectivity.

However, this is not always practical (or possible).

Therefore, one way to stay safe when connecting to a WiFi connection is to use a Virtual Private Network, or VPN.

You can mitigate the risk of becoming a victim of WiFi Hacking by using a Virtual Private Network (VPN) Click to Tweet

The Reason WiFi Hacking is a Scary Threat to Your Business

Divider

When you should use a VPN when connecting to WiFI

WiFi Hacking - Use a VPNYou can use a VPN tool to mitigate some risk when using a WiFi connection that you don’t trust.

Very simply put, a VPN tool encrypts any data that is transmitted by your computer.

As a result of the encryption, your data is virtually unreadable by hackers.

I’ve written before about consumer-grade VPN tools including:-

Many of these tools are low-cost, or free to use.

Consumer tools like this could be recommended for friends or family. They will help them stay safe when away from the home or office.

However, if you’re an IT Solution Provider or Managed Service Provider, these consumer tools won’t be a good fit for your clients.

For example, you don’t want to be managing dozens, hundreds or even thousands of users working with different consumer products!

Therefore, if you’re an IT business, I’d recommend reading my article on How To Secure Clients with a Managed VPN for MSPs.

For instance, within my business, we use Privatise VPN.

Privatise is easy to deploy and manage for MSPs, and very easy to use for end-users.

Divider

Conclusion

When it comes to WiFi security, the majority of us think that we would never become a target. However, the reality is that everybody is a target for Cybercriminals!

Therefore, when it comes to using any type of public WiFi connection you need to stay safe.

This public wifi connection might be a hotel, restaurant, coffee shop, pub, or even an Airbnb.

Using your 4G or 5G connectivity is safer than connecting to an untrusted WiFi connection. However, this is not always practical, and so I’d always recommend the use of a Virtual Private Network (VPN).

A VPN tool will encrypt your WiFi traffic, making your data inaccessible to hackers.

The bottom line here is, you cannot blindly trust WiFi connections. Hackers can, and will, easily fool you into giving up your confidential data via WiFi.

Make sure that you use a VPN tool and stay safe on WiFi!

I’m intrigued — have you experienced a WiFi hack? What are your thoughts on staying safe when away from your home or office?

Please, leave a comment below or get in touch.

The Reason WiFi Hacking is a Scary Threat to Your Business

Divider

You Might Also Be Interested In

RICHARD TUBB

Richard Tubb is one of the best-known experts within the global IT Managed Service Provider (MSP) community. He launched and sold his own MSP business before creating a leading MSP media and consultancy practice. Richard helps IT business owner’s take back control by freeing up their time and building a business that can run without them. He’s the author of the book “The IT Business Owner’s Survival Guide” and writer of the award-winning blog www.tubblog.co.uk

All Posts

You might like:

How to Help Your MSP Clients Stay Safe When Using AI Tools image

How to Help Your MSP Clients Stay Safe When Using AI Tools

Article | By Gudrun Lauret
7 Examples of How to Promote Positive Mental Wellbeing In Your Business image

7 Examples of How to Promote Positive Mental Wellbeing In Your Business

Article | By Stephen McCormick
How to Better Support Your MSP Clients With AI Tools image

How to Better Support Your MSP Clients With AI Tools

Article | By Gudrun Lauret
Encouraging Wellbeing as an Important Investment for Your Business image

Encouraging Wellbeing as an Important Investment for Your Business

Article | By Stephen McCormick
A Blueprint for Success: Sensational Insights Revealed at SuperSummit 2024 image

A Blueprint for Success: Sensational Insights Revealed at SuperSummit 2024

Article | By Stephen McCormick
Sensational Takeaways from The MSP Show 2024 image

Sensational Takeaways from The MSP Show 2024

Article | By Stephen McCormick
Tubbservatory Round-Up #28 – April 2024 image

Tubbservatory Round-Up #28 – April 2024

Article | By Stephen McCormick
Why Consistent Content Marketing is Key for MSP Sales Success image

Why Consistent Content Marketing is Key for MSP Sales Success

Article | By Gudrun Lauret
Client Profitability Matrix: The Essential Data You Need To Capture image

Client Profitability Matrix: The Essential Data You Need To Capture

Article | By Stephen McCormick
Cybersecurity Masterclasses: Practical Advice To Boost Security For MSPs image

Cybersecurity Masterclasses: Practical Advice To Boost Security For MSPs

Article | By Stephen McCormick
In-House or Outsourced Cybersecurity: What’s Best for MSPs? image

In-House or Outsourced Cybersecurity: What’s Best for MSPs?

Article | By Graham Pierrepoint
Tubbservatory Round-Up #27 – March 2024 image

Tubbservatory Round-Up #27 – March 2024

Article | By Stephen McCormick

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

Share via
Send this to a friend