Indian hotels and resorts to Accomodate strong Wi-Fi security in Place to protect Travellers’ Data: FireEye

 Indian hotels and resorts to Accomodate strong Wi-Fi security in Place to protect Travellers’ Data: FireEye
  • APT28 has already attacked travellers in hotels throughout Europe and the Middle East
  • APT28 uses various hacking techniques, such as "EternalBlue" and "Responder" sniffing passwords from Wi-Fi traffic
  • Indian organisations must have strong security controls in place to detect attackers

India, August 12, 2017: A Russian hacking group "APT28" is targeting the hospitality sector globally and the Indian hotels and resorts must have strong Wi-Fi security in place to safeguard travellers' data from being stolen, a cyber security company said on Friday.

APT28 has already attacked travellers in hotels throughout Europe and the Middle East in a campaign that dates back to July this year, according to the US-based company FireEye.

APT28 uses various hacking techniques, such as "EternalBlue" and "Responder" sniffing passwords from Wi-Fi traffic.

"One of the most concerning aspects of this operation is the victims included hotel guests who didn't do anything wrong. They didn't click a malicious link or open an attachment they shouldn't have. They simply used the Internet over Wi-Fi in their hotels," Subhendu Sahu, Acting Country Manager for India, FireEye, told IANS.

"Indian organisations should have strong security controls in place to detect attackers who compromise traveling employees' systems and then follow them home like an unwanted souvenir," Sahu added.

FireEye has claimed to have found a malicious document named "Hotel_Reservation_Form.doc", sent in spear phishing emails to multiple companies in the hospitality industry, including hotels in at least seven European countries and one Middle Eastern country.

APT28 used EternalBlue and Responder to spread laterally through networks and target travelers to steal usernames and hashed passwords.

According to FireEye, APT28, in an incident in 2016, gained initial access to a victim's network via credentials likely stolen from the hotel Wi-Fi network and hacked the victim's Outlook Web Access (OWA) account.

Once inside the network of a hospitality company, APT28 seeks machines that control both guest and internal Wi-Fi networks.

"Cyber espionage activity against the hospitality industry is typically focused on collecting information on or from hotel guests of interest rather than on the hotel industry itself, though actors may also collect information on the hotel as a means of facilitating operations," FireEye said.

"Business and government personnel who are traveling often rely on systems to conduct business other than those at their home office, and may be unfamiliar with threats posed while abroad," it added.

Travelers must be aware of the threats especially when in foreign countries and take extra precautions to secure their systems and data.

"Publicly accessible Wi-Fi networks present a significant threat and should be avoided whenever possible," FireEye warned.

There are also other hacking groups targeting travellers apart from APT28, including "South Korea-nexus Fallout Team" (also known as "Darkhotel") and "Duqu 2.0". (IANS)

Related Stories

No stories found.
logo
NewsGram
www.newsgram.com