Connect with us

Published

on

Over the years, travelers have repeatedly been warned to avoid public Wi-Fi in places like airports and coffee shops. Airport Wi-Fi, in particular, is known to be a hacker honeypot, due to what is typically relatively lax security. But even though many people know they should stay away from free Wi-Fi, it proves as irresistible to travelers as it is to hackers, who are now updating an old cybercrime tactic to take advantage.

An arrest in Australia over the summer set off alarm bells in the United States that cybercriminals are finding new ways to profit from what are called “evil twin” attacks. Also classified within a type of cybercrime called “Man in the Middle” attacks, evil twinning occurs when a hacker or hacking group sets up a fake Wi-Fi network, most often in public settings where many users can be expected to connect.

In this instance, an Australian man was charged with conducting a Wi-Fi attack on domestic flights and airports in Perth, Melbourne, and Adelaide. He allegedly set up a fake Wi-Fi network to steal email or social media credentials.

“As the general population becomes more accustomed to free Wi-Fi everywhere, you can expect evil twinning attacks to become more common,” said Matt Radolec, vice president of incident response and cloud operations at data security firm Varonis, adding that no one reads the terms and conditions or checks the URLs on free Wi-Fi.

“It’s almost a game to see how fast you can click “accept” and then ‘sign in’ or ‘connect.’ This is the ploy, especially when visiting a new location; a user might not even know what a legitimate site should look like when presented with a fake site,” Radolec said.

Today’s ‘evil twins’ can more easily hide

One of the dangers of today’s twinning attacks is that the technology is much easier to disguise. An evil twin can be a tiny device and can be tucked behind a display in a coffee shop, and the small device can have a significant impact.

“A device like this can serve up a compelling copy of a valid login page, which could invite unwary device users to enter their username and password, which would then be collected for future exploitation,” said Cincinnati-based IT consultant Brian Alcorn. 

The site doesn’t even have to actually log you in. “Once you’ve entered your information, the deed is done,” Alcorn said, adding that a harried, weary traveler probably would just think the airport Wi-Fi is having issues and not give it another thought.  

People who are not careful with passwords, such as use of pet’s names or favorite sports teams as their password for everything, are even more vulnerable to an evil twin attack. Alcorn says for individuals who reuse username and password combinations online, once the credentials are obtained they can be fed into AI, where its power can quickly give cybercriminals the key.

“You are susceptible to exploitation by someone with less than $500 in equipment and less skill than you might imagine,” Alcorn said. “The attacker just has to be motivated with basic IT skills.”

How to avoid becoming a victim of this cybercrime

When in public places, experts say it’s best to use alternatives to public WiFi networks.

“My favorite way to avoid evil twin attacks is to use your phone’s mobile hotspot if possible,” said Brian Callahan, Director of the Rensselaer Cybersecurity Collaboratory at Rensselaer Polytechnic Institute.

Users would be able to spot an attack if through a phone relying on its mobile data and sharing it via a mobile hotspot.

“You will know the name of that network since you made it, and you can put a strong password that only you know on it to connect,” Callahan said.

If a hotspot isn’t an option, a VPN can also provide some protection, Callahan said, as traffic should be encrypted to and from the VPN.

“So even if someone else can see the data, they can’t do anything about it,” he said.

Airport, airline internet security issues

At many airports, the responsibility for WiFi is outsourced and the airport itself has little if any involvement in safeguarding it. At Dallas Fort Worth International Airport, for example, Boingo is the Wi-Fi provider.

“The airport’s IT team does not have access to their systems, nor can we see usage and dashboards,” For said an airport spokesman. “The network is isolated from DAL’s systems as it is a separate standalone system with no direct connection to any of the City of Dallas’ networks or systems internally.” 

A spokeswoman for Boingo, which provides service to approximately 60 airports in North America, said it can identify rogue Wi-Fi access points through its network management. “The best way passengers can be protected is by using Passpoint, which uses encryption to automatically connect users to authenticated Wi-Fi for a safe online experience,” she said, adding that Boingo has offered Passpoint since 2012 to enhance Wi-Fi security and eliminate the risk of connecting to malicious hotspots.

Alcorn says evil twin attacks are “definitely” occurring with regularity in the United States, it’s just rare for someone to get caught because they are such stealth attacks.  And sometimes hackers use these attacks as a learning model. “Many evil twin attacks may be experimental by individuals with novice-to-intermediate skills just to see if they can do it and get away with it, even if they don’t use the collected information right away,” he said.

The surprise in Australia wasn’t the evil twinning attack itself, but the arrest.

“This incident isn’t unique, but it is unusual that the suspect was arrested,” said Aaron Walton, threat analyst at Expel, a managed services security company. “Generally, airlines are not equipped and prepared to handle or mediate hacking accusations. The typical lack of arrests and punitive action should motivate travelers to exercise caution with their own data, knowing what a tempting and usually unguarded -target it is — especially at the airport.”

In the Australian case, according to Australian Federal Police, dozens of people had their credentials stolen.

According to a press release from the AFP, “When people tried to connect their devices to the free WiFi networks, they were taken to a fake webpage requiring them to sign in using their email or social media logins. Those details were then allegedly saved to the man’s devices.”  

Once those credentials were harvested, they could be used to extract more information from the victims, including bank account information.

For hackers to be successful, they don’t have to dupe everyone. If they can persuade only a handful of people – statistically easy to do when thousands of harried and hurried people are milling around an airport – they will succeed.

“We expect WI-Fi to be everywhere. When you go to a hotel, or an airport, or a coffee shop, or even just out and about, we expect there to be Wi-Fi and often freely available WI-FI,” Callahan said. “After all, what’s yet another network name in the long list when you’re at an airport? An attacker doesn’t need everyone to connect to their evil twin, only some people who go on to put credentials into websites that can be stolen.”

The next time you’re at the airport, the only way to be 100% sure you’re safe is to bring your own Wi-Fi.

Continue Reading

Technology

More demand than supply gives companies an edge, Jim Cramer says

Published

on

By

More demand than supply gives companies an edge, Jim Cramer says

“Supply constrained,” are the two of the most important words CNBC’s Jim Cramer said he’s heard so far during earnings season and explained why this dynamic is favorable for companies.

“When you’re supplied constrained, you have the ability to raise prices, and that’s the holy grail in any industry,” he said.

Intel‘s strong earnings results were in part because of more demand than supply, Cramer suggested. He noted that the company’s CFO, David Zinsner, said the semiconductor maker is supply constrained for a number of products, and that “industry supply has tightened materially.”

Along with Intel, other tech names that are also supply constrained and performing well on the market include Micron, AMD and Nvidia, Cramer continued.

These companies don’t have enough product in part because the storage needs of artificial intelligence are incredible high, Cramer said. He added that he thinks demand has overwhelmed supply because semiconductor capital equipment companies didn’t manufacture enough of their own machines as they simply didn’t anticipate such a volume of orders.

Outside of tech, Cramer said he thinks airplane maker Boeing and energy company GE Vernova are also supply constrained, adding that he thinks the former will say it’s short on most of its planes when it reports earnings next week. GE Vernova is supply constrained with its power equipment, like turbines that burn natural gas, he continued, which is the primary energy source for the ever-growing crop of data centers.

GE Vernova and Boeing are also set to be winners because they make big-ticket items that other countries can buy from the U.S. to help close the trade deficit, Cramer added.

“In the end, we have more demand than supply in a host of industries and that’s the ticket for good stock performance,” he said. “I don’t see that changing any time soon.”

Jim Cramer’s Guide to Investing

Sign up now for the CNBC Investing Club to follow Jim Cramer’s every move in the market.

Disclaimer The CNBC Investing Club holds shares of Nvidia and GE Vernova.

Questions for Cramer?
Call Cramer: 1-800-743-CNBC

Want to take a deep dive into Cramer’s world? Hit him up!
Mad Money TwitterJim Cramer TwitterFacebookInstagram

Questions, comments, suggestions for the “Mad Money” website? madcap@cnbc.com

Continue Reading

Technology

3 takeaways from Intel earnings: Cash flow, foundry progress and hardware surprise

Published

on

By

3 takeaways from Intel earnings: Cash flow, foundry progress and hardware surprise

Wall Street remains skeptical on Intel despite its return to profitability

Intel snapped a losing streak of six straight quarterly losses and returned to profitability in the third quarter.

In its first earnings report since the Trump administration acquired a 10% stake in the company, the U.S. chipmaker posted strong revenue, noting robust demand for chips that it expects to continue into 2026.

Client computing revenue, which includes chips for PCs and laptops, grew 5% year over year, benefiting from PC market stabilization and artificial intelligence PC prospects.

CEO Lip-Bu Tan said in a call with analysts Thursday that artificial intelligence “is a strong foundation for sustainable long-term growth as we execute.”

The chip strength and demand were bright spots, but there were areas of concern as well, with the company’s foundry business still needing a big break.

Here are three takeaways from the chipmaker’s Q3 report:

Cash flow

“We significantly improved our cash position and liquidity in Q3, a key focus for me since becoming CEO in March,” Tan said on a call with analysts Thursday.

Intel landed an $8.9 billion investment from the U.S. government in August, along with $2 billion from Softbank, but has not yet received the $5 billion tied to a deal with Nvidia. The company expects that deal to close by the end of Q4.

With all of those transactions completed, plus the Altera sale, Intel will have $35 billion in cash on hand, CFO David Zinser told CNBC.

The U.S. government is the company’s biggest shareholder, and Intel stock is up more than 50% since Aug. 22, when Commerce Secretary Howard Lutnick announced the deal.

“Like any shareholder, we have to keep in touch with them,” Zinser said of the U.S. stake. “We don’t tell them how the numbers are going before the quarter. We generally talk to them like Fidelity,” another Intel shareholder.

Stock Chart IconStock chart icon

hide content

Intel 3-month stock chart.

Foundry

The firm’s foundry remains a work in progress.

Revenue fell 2% over the year before, and it has yet to land a major customer.

Intel now has two fabs running 18A nodes, which are designed for AI and high-performance computing applications.

“We are making steady progress on Intel 18A,” Tan said of its latest chip technology. “We are on track to bring Panther Lake to market this year.”

Zinser said the more advanced 14A nodes won’t be put in supply until the company has “real firm demand.”

Old stuff still selling

Zinser said the company’s older chipmaking processes, or nodes, have continued to do well, “and that was probably the part that was more unexpected.”

Zinser said the chipmaker met some of the central processing unit (CPU) demand with inventory on hand, but they will be behind in Q1, “probably Q2 and maybe in Q3.”

The supply crunch has been with older Intel 10 and 7 manufacturing technologies.

Many customers are opting for less advanced hardware to refresh their operating systems, demonstrating enterprises aren’t waiting for cutting-edge chips when proven technology gets the job done.

Read more CNBC tech news

Continue Reading

Technology

What Cramer expects from 10 stocks reporting earnings next week; calls two buys

Published

on

By

What Cramer expects from 10 stocks reporting earnings next week; calls two buys

Continue Reading

Trending