Feeds

UK retail Wi-Fi security still patchy

War walk on the wild side

Internet Security Threat Report 2014

Wi-Fi security in UK retail environments is improving, but shops remain vulnerable to the sorts of attacks carried out as part of the infamous TJX credit card heist.

The cybercrooks, who lifted more than 21 million credit card records, leapfrogged onto the retailer's credit card database after first breaking into the wireless network of a regional store, a subsequent investigation ahead of upcoming US trials revealed. The incident ought to have acted as a wake-up call to retailers worldwide, but progress has been a little slow.

A Wi-Fi war walk, passively detecting Wi-Fi networks in a popular shopping areas around Oxford Circus last week, revealed numerous problems.

Data was collected over a one hour period on 16 December using security scanning tools from Motorola AirDefense. No networks or devices were actively compromised during the exercise

In all, over 300 Access Points (APs) and 400 wireless clients were passively detected during the exercise. Almost three in four (71 per cent) of APs were set up for 802.11g access. Nearly one in four (21 per cent) of networks detected were running the older 802.11a protocol. These older networks are used to support mobile scanners, making them popular in retail environments.

A quarter of the networks (25 per cent) detected were set-up without any encryption while a further 21 per cent were protected only by easily breakable WEP encryption. Although some of the networks with no crypto were likely to be related to hotspot services available in cafe’s and other outlets for consumer access, there still were many identifiable business Wi-Fi networks using no encryption at all.

Motorola AirDefense found that a further 18 per cent of networks were using TKIP encryption, a modified version of WEP that rotates keys with every packet for extra security. However recent attacks have also revealed flaws in the TKIP protocol. Only 20 per cent of the Wi-Fi networks identified during the exercise were using the recommended AES/CCMP encryption.

Only 3 per cent of the stations were using AES/CCMP encryption and only 6 per cent of the networks discovered were using enterprise class IEEE 802.1X authentication. All others had either no authentication for users or relied on a shared key.

Diane Johnson, Motorola AirDefense manager EMEA, noted other common problems identified during the test, including naming a Wi-Fi network with the same name as a store, making it easier for crooks to identify potential targets. Cybercrooks want to use access to retail branches as stepping stones towards corporate networks that contain a much greater cache of goodies. Running flat networks with no VPNs makes it easier to map corporate networks and attack database systems, the sort of attack carried out by the TJX hackers.

For all the problems identified during the exercise, Johnson said that the security of UK retail networks had improved from the last time it carried out a similar exercise in London back in September. Furthermore, it was generally better than those of similar environments elsewhere in Europe. She attributed the improvements over recent months to changes made so that retailers could achieve compliance with the credit card industry's PCI DSS standard for merchants.

Motorola's exercise also highlighted potential dangers for businessmen and Christmas shoppers taking advantage of West End hotspots to catch up with some surfing.

More than 25 per cent of stations detected were probing for open hotspots, with 10 per cent probing for "free public Wi-Fi". Machines configured in this way could easily become subject to an Evil Twin-style attacks using a fake hotspot or ad hoc network. ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.