The corporate espionage is considered one of the most dangerous threats for private business, but also for government entities, we have discussed in the past about various kinds of offensives against targeted networks, but the story that I’m going to tell you is very intriguing.
Security expert Larry Pesce has designed a shipping board-sized package that could be used to hack wireless networks through the ordinary post.
The kit was built on a Raspberry Pi b_ with an AWUS051NH wireless card, a cheap battery charger, kismet and custom software.
The board can be used by a threat actor to target organizations, shipping companies, or any entity along the shipping route.
Security experts use to call “war shipping” the attacks based on hacking hardware which aims to compromise wireless networks from a mail room or absent staff member’s desk.
“We wanted to know when it arrived at an appropriate location or very close, when specific networks were in range so we could launch attacks, to make sure we were attacking the right folks and what could be done in transit,” Pesce told Derbycon security delegates. “Maybe [an employee] posts on Twitter ‘hey I just got fired’ and you can ship to them.”
The war shipping kit assembled by Pesce is based on a Raspberry Pi board, it could be programmed with necessary hacking packages and has power issues granting up to 300 hours of power. The device also includes a module to report location without GPS, the choice to not use GPS is to avoid batteries draining.
Pesce’s war shipping kit is able to track package location by calling Apple’s WiFi location mapping through an undocumented API used in the iSniff project.
iSniff GPS is a proof of concept Python application which uses Apple’s location services, combined with data iPhones and iPads disclose when they join wifi networks, to reveal where the package is located.
“It reads in Kismet XML output, reads all BSSIDs, and queries Apple’s undocumented APIs to populate a Google Map,” Pesce said.
Pesce has published the software used for is war shipping kit on GitHub, every users can create its hacking board using it and could also improve it.
War shipping attacks are very insidious and difficult to prevent and mitigate, using it an attacker could deploy “behind the enemy line” its hacking tool. Let’s imagine a similar package that stay in a mail room of a company for an entire weekend …
(Security Affairs – War Shipping, hacking)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.