Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Security Scientists Create Botnet Drone, Which Brings Down Wireless Networks

Security scientists from SIT recently built "SkyNET," one furtive network, which facilitates connection between host PCs and a bot-controller. The device contains a mock helicopter combined with a PC, programmed particularly to strike WiFi networks. CrazyEngineers published this on September 10, 2011.

Describing the network device, security researchers state that it has the ability to shutdown PCs that are part of a wireless network followed with pulling them inside armies-of-bots that normally spam mails, cause denial-of-service conditions, or perform hacks. This ability reportedly, stems from the unsecured nature of personal networks that are online. They're frequently short of security controls, security patches for computers, auditing or logging facilities, and suitable password management, while characteristically utilize poorly-secured wireless radio.

Moreover according to the researchers, when the drone acquires access to networks, it uses several programs for hijacking target computers, like the Metasploit tool. As for the procedure of attack, the drone spreads it over four stages for enlisting target PCs inside the network. The process is named PAAE implying pilot, attack, attack, enlist, the researchers explain. CBR published this on September 9, 2011.

Evidently, with SkyNET it becomes possible for the owner towards regulating the network-of-bots using the drone instead of a mundane online connection that makes it difficult for tracking down the bot-herder. Besides, what numerous householders owning wireless networks miss doing is altering their router passwords.

Also according to the specialists, the bot-herder can be traced only if the drone is followed right from its starting point alternatively it's caught under the radar with a forensic probe initiated into it. Nevertheless, the safeguards the scientists advise aren't merely password alteration but sidelining of WiFi networks too via identifying fresh connections.

Cyber security specialist Sven Dietrich, who developed one POC (proof-of-concept) drone, demonstrated how concealing the SSID of the network proved helpful, while allowing only familiar MAC addresses to use the WiFi-connected PC-network would be helpful too. Examiner.com reported this on September 11, 2011.

Furthermore, in a related demonstration, the scientists advised organizations for adopting mechanisms for identifying their networks' other tools as also taking measures for blocking the nodes for WiFi access.

Related article: Securities Push Up A Must For Web Companies

ยป SPAMfighter News - 9/20/2011

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next