THREAT PREVENTION

Device Hijacking

Prevent communications between corporate devices and uncontrolled devices

Device Hijacking

The enterprise network airspace is swarming with wireless broadcasting devices, also called Antenna for Hire
The enterprise network airspace is swarming with wireless broadcasting devices, also called Antenna for Hire
The enterprise network airspace is swarming with wireless broadcasting devices, also called Antenna for Hire

Problem

The enterprise network airspace is swarming with wireless broadcasting devices, also called Antenna for Hire. An Antenna for Hire can be a router at the cafe across the street, a security camera in an adjancent building, and even a contractor’s laptop.

According to AirEye’s survey of Access Points (AP) at corporate sites, for each corporate AP, there are 200-250 Antenna for Hire in the corporate proximity.

An Antenna for Hire may be compromised by a remote attacker, using software-based tools. Once under the control of the attack, the underlying device becomes an AP to a Wireless Receptor – a corporate-owned asset such as the corporate PC – and consequently diverts corporate wireless connections.

A Wireless Receptor connecting to an Antenna for Hire creates a wireless security policy where corporate communications are present on unauthorized and unmonitored channels.

Furthermore, this connection presents a security threat where an attacker gains control of the Wireless Receptor.

With no control over Antennas for Hire in the corporate network airspace, organizations are left oblivious to such communication diversions and helpless to their consequences.

Solution

Achieve network airspace control and protection, and prevent device hiajcking by using AirEye Dome:

  • Detect rogue and “Evil Twin” APs

  • Detect SSID-Squatting

  • Prevent corporate devices from connecting to rogue APs or Evil Twins

  • Prevent captive portal/ AP splash screen/ Pineapple “evil portal” attacks

  • Protect against FragAttacks

  • Prevent wireless exploitation of devices by attacks such Ripple20 or Amnesia33

Achieve network airspace control and protection and prevent data leakage by using AirEye Dome:
Achieve network airspace control and protection and prevent data leakage by using AirEye Dome:

Meraki User?
See AirEye Dome in Action

Apply for a free
account now

Apply Now