Feeds

Drive-by hacking linked to cyberterror

ICC misses the mark

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk

Updated The most comprehensive study of the insecurity of wireless networks in London to date has discovered that 94 per cent are leaving their networks open to drive-by hacking.

This possibly worthwhile survey is undermined by the cyberterrorism FUD spin put on the release.

A seven-month investigation of 5,000 wireless systems was conducted by IT security specialists Digilog, in collaboration with the International Chamber of Commerce's Cybercrime (ICC) Unit, who are using the survey to promote an anti-hacking service.

Wireless networks have a built-in encryption system (WEP), but in nearly all the companies investigated it had not been set up to work securely. Best practice is for firms to plug wireless LANs into virtual private networks in order to provide make sure traffic is securely encrypted.

The ICC Cybercrime Unit says that financial institutions, law firms, media organizations and government offices are among those at risk - and the evidence suggests a similar picture exists in other commercial centres throughout the world.

So far so good; but then Pottengal Mukundan, director of ICC's crime-fighting division, and his partners from Digilog embark on a flight of fancy about the supposed link between drive by hackers and international terrorism.

A statement on the survey 'warns': "And networks are not only at risk from attacks at close-quarters. University research in Hawaii has shown that signals can be intercepted from a distance of over 25 miles, raising fears of large-scale cyber-terrorism [our emphasis]. Computer-controlled power grids, telephone networks and water-treatment plants are at risk."

IT network managers are not always radio engineers, as the release points out, but they know that 2.4GHz (much less 5GHz) signals typically work of a distance measured in metres rather than miles.

The ICC Cybercrime Unit, which is essentially a business focused organisation known for providing useful advice about security matters in the past, has over-steped the mark this time. ®

Updated

Numerous people have emailed us to say that WLANs CAN work over longer distances with the right antenna. This is true.

To clarify. What we said about WLANs operating over distances of metres rather than miles applies to stock omnidirectional antenna. Longer distances, stretching into kilometres, are possible with a small parabolic antenna.

But such antennas are highly directional and require direct line-of-sight to the other transceiver which totally defeats the whole "drive by" hacking concept.

From a “stationary” vantage point you could do some interesting snooping with a dish, pointing it here and there looking for a signal, but that's not particularly easy or clandestine.

The real threat, identified by the study, comes from thrill-seeking hackers with wireless-equipped laptops, or possibly industrial espionage.

There is NO evidence that terrorists harnessing the insecurity of wireless LANs to their nefarious ends. The idea that there’s an Al Queda cell in Watford snooping on wireless traffic from the City of London, contained in the press release, is (we believe) alarmist. After speaking to Simon Gunning from Digilog this morning we’re satisfied that this spin was put on the release by marketing people, not those who conducted the study.

Related stories

802.1X can be toppled 'like set of dominoes'
Cisco and MS team on wireless security
RSA supplies answer to drive-by hacking?
Secure the Wireless Network firmware
Tool dumbs down wireless hacking
Rogue WLANS - the next security battlefield?
Wireless security is even flakier than we thought
War driving by the Bay

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.