Search for an article

Select a plan

Choose a plan from below, subscribe, and get access to our exclusive articles!

Monthly plan

$
13
$
0
billed monthly

Yearly plan

$
100
$
0
billed yearly

All plans include

  • Donec sagittis elementum
  • Cras tempor massa
  • Mauris eget nulla ut
  • Maecenas nec mollis
  • Donec feugiat rhoncus
  • Sed tristique laoreet
  • Fusce luctus quis urna
  • In eu nulla vehicula
  • Duis eu luctus metus
  • Maecenas consectetur
  • Vivamus mauris purus
  • Aenean neque ipsum
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

HomeCII/OT94% of Wi-Fi networks vulnerable to deauthentication attacks

94% of Wi-Fi networks vulnerable to deauthentication attacks

Published on

spot_img

A recent report released by Nozomi Networks Labs unveils a concerning revelation about the state of wireless network security worldwide. After analyzing over 500,000 wireless networks, the report indicates that a mere 6% of these networks are adequately safeguarded against wireless deauthentication attacks, leaving the majority highly vulnerable to potential cyber threats.

The implications of this security gap are far-reaching, especially in critical sectors like healthcare and industrial environments. In healthcare, compromised wireless networks could result in unauthorized access to sensitive patient data or disruptions to vital systems. Likewise, industrial settings face risks such as disrupted operations, halted production lines, and safety hazards for workers if subjected to these attacks.

The report delves into the key threats that industrial wireless environments are facing, shedding light on various attack vectors. Deauthentication attacks exploit vulnerabilities in network protocols to disconnect devices forcibly, causing operational disruptions and opening doors for further malicious activities. Rogue Access Points (APs) serve as unauthorized devices set up by attackers to imitate legitimate networks, luring devices into connecting and compromising data security. Eavesdropping poses a threat when unencrypted wireless communications are intercepted, allowing threat actors to steal credentials, access sensitive information, and monitor operations. Jamming attacks, on the other hand, involve flooding wireless channels with interference to disrupt communications, leading to downtime and operational inefficiencies, particularly impacting industries reliant on real-time connectivity.

The report also highlights significant cyber threat activity observed in the latter half of last year, with 48.4% of cyber threat alerts occurring during the impact phase of the cyber kill chain. Industries such as manufacturing, transportation, energy, utilities, and water/wastewater were particularly affected, with Command and Control (C&C) techniques accounting for 25% of observed alerts. These findings underscore the presence of adversaries within critical infrastructure systems and their persistence in gaining and maintaining control over access.

Moreover, researchers identified 619 newly published vulnerabilities in the second half of 2024, with a concerning 71% classified as critical. Additionally, 20 vulnerabilities scored high on the Exploit Prediction Scoring System (EPSS), indicating a high likelihood of future exploitation. Alarmingly, four vulnerabilities were already observed being actively exploited in the wild, highlighting the urgent need for organizations to address and mitigate critical vulnerabilities effectively.

In light of these findings, industry experts like Chris Grove, Director of Cybersecurity Strategy at Nozomi Networks, emphasize the escalating cyber threats targeting critical infrastructure. Grove stresses the importance of fortifying systems against a myriad of threats while maintaining operational efficiency and safety, especially in scenarios where human lives are at risk. By staying vigilant, understanding emerging threats, and leveraging insights, organizations can bolster their defenses to safeguard critical infrastructure systems and ensure resilience, safety, and operational continuity.

The report serves as a stark reminder of the cybersecurity challenges faced by wireless networks globally, urging organizations to proactively address vulnerabilities and enhance their security posture in the face of evolving cyber threats.

Source link

Latest articles

Measuring Cyber Risk Strategies for CFOs and Boards

In a recent interview conducted by Help Net Security, Mir Kashifuddin, Data Risk &...

Over $1 million stolen in cybercrime for Bar Harbor school construction project

BAR HARBOR, Maine (WMTW) - The Mount Desert Island Regional School System recently fell...

AWS SNS Utilized for Data Exfiltration and Phishing Attacks

Amazon Web Services’ Simple Notification Service (AWS SNS) has gained popularity as a reliable...

Federal Judges Halt Trump’s Plan to Mass Fire Federal Workers

In a surprising turn of events, a U.S. federal judge has issued a restraining...

More like this

Measuring Cyber Risk Strategies for CFOs and Boards

In a recent interview conducted by Help Net Security, Mir Kashifuddin, Data Risk &...

Over $1 million stolen in cybercrime for Bar Harbor school construction project

BAR HARBOR, Maine (WMTW) - The Mount Desert Island Regional School System recently fell...

AWS SNS Utilized for Data Exfiltration and Phishing Attacks

Amazon Web Services’ Simple Notification Service (AWS SNS) has gained popularity as a reliable...