"Hackers Use SSID Stripping to Trick Users Into Joining Rogue APs"

Security researchers from AirEye discovered a new hacking method called SSID Stripping that could be used to trick unsuspecting users into connecting to fraudulent wireless networks. In collaboration with Technion, AirEye revealed the possible manipulation of a wireless network's name, specifically the SSID (Service Set Identifier), by threat actors to display a fraudulent Wi-Fi network as a legitimate network to users. Wi-Fi networks are identified based on their network name, formally known as SSID, which serves as the primary identifier for users to find and connect to a specific network. The performance of SSID Stripping allows attackers to trick users into connecting to the rogue Wi-Fi networks that they have set up. Those who connect to these fraudulent networks would be left vulnerable to malware attacks, data theft, and device compromise. The SSID Stripping method is said to be a severe security threat as it affects several networks and devices running on Windows, macOS, Ubuntu, Android, and iOS. This article continues to discuss the potential performance and impact of SSID Stripping, and the free Windows-based tool released by AirEye to help users and organizations verify if they are vulnerable to this attack. 

CISO MAG reports "Hackers Use SSID Stripping to Trick Users Into Joining Rogue APs"

Submitted by Anonymous on