Device Hijacking
Prevent Communications Between Corporate Devices and Uncontrolled Devices
The enterprise network airspace is swarming with wireless broadcasting devices, also called Antenna for Hire. An Antenna for Hire can be a router at the cafe across the street, a security camera in an adjancent building, and even a contractor’s laptop.
According to AirEye’s survey of Access Points (AP) at corporate sites, for each corporate AP, there are 200-250 Antenna for Hire in the corporate proximity.
An Antenna for Hire may be compromised by a remote attacker, using software-based tools. Once under the control of the attack, the underlying device becomes an AP to a Wireless Receptor – a corporate-owned asset such as the corporate PC – and consequently diverts corporate wireless connections.
A Wireless Receptor connecting to an Antenna for Hire creates a wireless security policy where corporate communications are present on unauthorized and unmonitored channels.
Furthermore, this connection presents a security threat where an attacker gains control of the Wireless Receptor.
With no control over Antennas for Hire in the corporate network airspace, organizations are left oblivious to such communication diversions and helpless to their consequences.
How Aireye Protects You?
Detect rogue and “Evil Twin” APs
Detect SSID-Squatting
Prevent corporate devices from connecting to rogue APs or Evil Twins
Prevent captive portal/ AP splash screen/ Pineapple “evil portal” attacks
Protect against FragAttacks
Prevent wireless exploitation of devices by attacks such Ripple20 or Amnesia33