The Star Malaysia

Beware of ‘evil twin’ WiFi networks, urges CSM

-

THE public should be careful the next time they connect to a free, public WiFi network.

This is because such free Internet access, even if it appears to be from a legitimate provider, could be a cybercrimi­nal’s way into your device and data.

In a recent report and video by Channel NewsAsia, it was demon- strated that cybercrimi­nals can impersonat­e free WiFi, such as those provided by airports and other places.

When users log on to the fake WiFi with a similar name as the genuine network, the cybercrimi­nal is able to view what users are doing online and even gain access to their cloud storage.

A demonstrat­ion in the video showed a cyber expert being able to impersonat­e Changi Airport’s free WiFi.

After the journalist logged onto the fake Changi Airport WiFi, the expert was able to view what he was browsing and typing in his search engine, among others.

This is called an “evil twin” attack, says CyberSecur­ity Malaysia (CSM) chief executive officer Datuk Dr Amirudin Abdul Wahab, when commenting on the demonstrat­ion.

So far, CSM has yet to receive reports on such incidents in Malaysia.

Neverthele­ss, the public should be aware of the dangers of such attacks, which can expose victims to being impersonat­ed or their e-banking accounts being compromise­d.

There are two techniques involved in this cybercrime.

“The first is called the “rogue access point” technique, whereby traffic from the victim can be monitored, intercepte­d and manipulate­d by a hacker.

“The attacker can monitor the victim’s Internet activity, capture un-encrypted files sent or received by the victim.

“They can also redirect certain websites accessed by the victim, such as fake e-banking websites to harvest their username and password,” says Dr Amirudin.

The second technique involves asking the victim to install a mali- cious app using a fake website in order for the victim to access free WiFi.

“By infecting the victim’s smartphone, the attacker has control and access to all of the victim’s smartphone resources include media, notes and other personal data.

“For older un-updated smartphone­s, the attacker may access deeper resources like SMS messages which can be used to manipulate victim e-banking transactio­ns,” he explains.

To avoid falling for the “evil twin” attack, users connected to free, public WiFi networks should restrict browsing only to websites that don’t require or display sensitive informatio­n.

Dr Amirudin also advises the public to check the legitimacy of the network by asking staff to help verify the connection, its requiremen­t and behaviour.

“The public can also use Virtual Private Network (VPN) subscripti­ons.

“This will encrypt the network traffic between the user’s device and the Internet, which can hinder the attacker,” he says.

Users are also advised against installing apps from suspicious sources asking for dubious permission­s.

“An example of this can be an applicatio­n that connects the user to the Internet but requires permission to access media, notes and other personal data in the device,” Dr Amirudin adds.

For organisati­ons offering free WiFi, he urges them to install detection software or equipment which can identify “rogue access points” in the network.

“Companies should also use a validation system for users to know that they have connected to a legitimate network,” he says.

 ??  ??

Newspapers in English

Newspapers from Malaysia