RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2
2019/12/11 16:14:42

Warshipping (cyber attack Warship)

Now researchers from the X-Force Red project of IBM company developed verification of the concept (PoC) which can become the next step in evolution of cyber-crimes in 2019. It is called warshipping With warshipping, hackers ship their exploits directly to their target’s mail room , and combines technical methods with other, more traditional methods.

Content

As warshipping works

Warshipping uses the available, inexpensive and low-power computer for remote accomplishment of the attacks in close proximity to the victim regardless of location of cyber-criminals. For this purpose, on a regular mail in the form of sending the small device containing the modem with 3G-connection goes to office of the victim. Existence of the modem means that the device can be controlled far off[1].

File:Aquote1.png
Thanks to the built-in wireless chip, the device performs search of the nearest networks for tracking of their network packets. Charles Henderson, the head X-Force Red in IBM, explains: "As soon as we see that our "warship" arrived to entrance doors, the mail room or the place of unloading of mail at the victim, we are already capable to control far off a system and to start tools for the passive or active attack of a wireless network of the victim".
File:Aquote2.png

The attack using warshipping

As soon as so-called "warship" (warship) physically appears in office of the victim, the device begins to listen to data packets on a wireless network which it can use for penetration into network. It also listens to processes of authorization of users for connection to Wi-fi network of the victim and through cellular communication sends these data to the cyber-criminal that he could decrypt this information and receive the password to Wi-Fi of network of the victim.

Using this wireless connection, the malefactor can move on network of the victim now, trying to discover the vulnerable systems, available data and also to steal confidential information or passwords of users.

Threat with a huge potential

According to Henderson, this attack can quite become the hidden, effective insider threat: it inexpensive and not difficult in implementation and also can remain unnoticed from the victim. Moreover, the malefactor can organize this threat from far away, being at considerable distance. In a number of the companies where daily there passes the large volume of mail and sendings, it is rather easy not to notice or not to pay attention to small sending.

One of aspects which does warshipping extremely dangerous is that it can bypass protection of e-mail which is implemented at the victim for prevention of malware and other attacks which extend through investments.

See Also





Notes