Home | Solution | By Over-the-Air Threat | Device Hijacking

Device Hijacking

Prevent Communications Between Corporate Devices and Uncontrolled Devices

The enterprise network airspace is swarming with wireless broadcasting devices, also called Antenna for Hire. An Antenna for Hire can be a router at the cafe across the street, a security camera in an adjancent building, and even a contractor’s laptop.

According to AirEye’s survey of Access Points (AP) at corporate sites, for each corporate AP, there are 200-250 Antenna for Hire in the corporate proximity.

An Antenna for Hire may be compromised by a remote attacker, using software-based tools. Once under the control of the attack, the underlying device becomes an AP to a Wireless Receptor – a corporate-owned asset such as the corporate PC – and consequently diverts corporate wireless connections.

A Wireless Receptor connecting to an Antenna for Hire creates a wireless security policy where corporate communications are present on unauthorized and unmonitored channels.

Furthermore, this connection presents a security threat where an attacker gains control of the Wireless Receptor.

With no control over Antennas for Hire in the corporate network airspace, organizations are left oblivious to such communication diversions and helpless to their consequences.

Device Hijacking Problem
achieve_network_airspace_control_and_protection_and_prevent_data_leakage_by_using_aireye_dome

How Aireye Protects You?

Achieve network airspace control and protection, and prevent device hiajcking by using AirEye:
check

Detect rogue and “Evil Twin” APs

check

Detect SSID-Squatting

check

Prevent corporate devices from connecting to rogue APs or Evil Twins

check

Prevent captive portal/ AP splash screen/ Pineapple “evil portal” attacks

check

Protect against FragAttacks

check

Prevent wireless exploitation of devices by attacks such Ripple20 or Amnesia33

achieve_network_airspace_control_and_protection_and_prevent_data_leakage_by_using_aireye_dome