Waking Up to Warjacking

Share it on Twitter  
Share it on Facebook  
Share it on Google+
Share it on Linked in  
Have you ever hopped onto a stranger's unsecured Wi-Fi connection? If so, you're not alone.

According to Jupiter Research, 14 percent of Wi-Fi consumers have logged onto a neighbor's network in the last year.

Leeching off a neighbor's wireless connection seems pretty harmless. But it gets ugly when the leech uses that connection for activities that are illegal and/or reprehensible.

For example, in June 2004, two men plead guilty of hacking into Lowe's computer system through an unsecured Wi-Fi connection at one of its Detroit stores. The two men cracked Lowe's computers in six states and altered the home improvement retailer's sales system in order to steal credit card numbers.

Earlier this month, a Florida man was charged with the felony offense of unauthorized network access for sitting in a parked car so he could mooch someone's home Wi-Fi. Authorities didn't say what exactly he was doing via that Internet connection.

But the unsavory possibilities include swapping pirated media files, downloading child pornography, pumping stocks or posting slanderous messages or hate speech on Internet forums, according to Tom Ohlsson, director of marketing for Roving Planet, a vendor of enterprise wireless LAN security and management software.

"You don't want your IP address associated with the activity, so why not go three or four blocks away and highjack their IP address?" Ohlsson said. "There are absolutely no digital fingerprints."

At least, there are none of the perp's. But the illegal activity could show up in the log files of the ISP as coming from the legit computer inside the house.

"Whatever folks use the Internet for will be the uses that unsecured [access points] are used for," said William Terrill, a senior analyst for Burton Group. "And, by using someone else's [access point] and Internet connection, the user gets a free ride and a certain level of 'safety' from detection." He pointed out that simply logging onto an unsecured wireless node couldn't be considered hacking.

"Two or three years ago, wardriving meant guys driving through the neighborhood looking for open networks just for their jollies or to check their e-mail," Ohlsson said. "Warjacking is a whole new ballgame: using someone else's Wi-Fi connection for really bad activity."

This article was first published on internetnews.com, a JupiterWeb site. To read the full article, click here.

Submit a Comment

Loading Comments...