- Evil twin phishing
Evil twin is the
wireless version of thephishing scam . An attacker fools wireless users into connecting alaptop ormobile phone to a tainted hotspot by posing as a legitimate provider.Wireless devices link to the
Internet via "hotspots" - nearby connection points that they lock on to. But these hotspots can act like an open door to thieves. Anyone with suitable equipment can locate a hotspot and take its place, substituting their own "evil twin".Method
The attacker uses a bogus
base station that latches on to someone usingWi-Fi wireless technology. Victims think their laptops or mobile phones are connected to bona fide wireless Internet connections. Once they connect to the wireless network, the evil twins can access and steal their login information, in addition to confidential information which could potentially lead toidentity theft .Unwitting web users are invited to log into the attacker's server with bogus login prompts, tempting them to give away sensitive information such as
username s andpassword s. Often users are unaware they have been duped until well after the incident has occurred.Users think they have logged on to a wireless hotspot connection when in fact they have been tricked into connecting to the attacker's base station. The hacker jams the connection to the legitimate base station by sending a stronger signal within proximity to the wireless client - thereby turning itself into an 'evil twin.'
Virtual private network s or end to end encryption may be used to protect passwords, E-mail and other sensitive information.ee also
#
Wireless LAN Security References
* [http://www.cnn.com/2005/TECH/internet/01/20/evil.twins/ CNN.com]
* [http://www.pcworld.com/news/article/0,aid,120054,00.asp PC World]
* [http://fr3dc3rv.blogspot.com/2007/04/evil-twin.html FR3DC3RV Evil Twin Paper]
Wikimedia Foundation. 2010.