NewsBytes Stage
    Hindi
    More
    In the news
    Narendra Modi
    Amit Shah
    Box Office Collection
    Bharatiya Janata Party (BJP)
    OTT releases
    Hindi
    NewsBytes Stage
    India
    Business
    World
    Politics
    Sports
    Technology
    Entertainment
    Auto
    Lifestyle
    Career
    Visual Stories
    Find Cricket Statistics

    Download Android App

    Follow us on
    • Facebook
    • Twitter
    • Linkedin
    Home / News / Technology News / Russian hackers exploiting 'nearest neighbor' to infiltrate distant Wi-Fi networks
    Summarize
    Next Article
    Russian hackers exploiting 'nearest neighbor' to infiltrate distant Wi-Fi networks
    Hackers have been linked to Russia's military intelligence agency

    Russian hackers exploiting 'nearest neighbor' to infiltrate distant Wi-Fi networks

    By Akash Pandey
    Nov 24, 2024
    05:06 pm

    What's the story

    Russian hackers have devised a complex technique to breach Wi-Fi networks, without having to be physically close to the target.

    The technique, dubbed the "nearest neighbor attack," was unearthed by cybersecurity firm Volexity while investigating a network breach in Washington DC.

    The attackers were traced back to a hacker group linked to Russia's military intelligence agency and known by various monikers, including APT28, Fancy Bear, and Unit 26165.

    Attack strategy

    How does the 'nearest neighbor attack' work?

    The "nearest neighbor attack" is a multi-step process that uses vulnerabilities in nearby networks to breach the main target.

    First, hackers compromise a vulnerable network near their target. They then take control of a laptop in this compromised network and use its Wi-Fi to breach the target network.

    This way, they can launch attacks from a distance, exploiting local Wi-Fi vulnerabilities without risking physical detection.

    Attack complexity

    It involves multiple network breaches

    In the case investigated by Volexity, the "nearest neighbor attack" was not just a single network breach.

    The firm discovered evidence of a chain of Wi-Fi network infiltrations, involving as many as three different networks before hitting the final target.

    This complicated operation leveraged different technical elements like credential exploitation, bypassing the two-factor authentication process, and domain name leakage.

    Even after initial detection, the hackers continued with multiple intrusion attempts.

    Security implications

    New attack method poses significant challenges for cybersecurity

    The "nearest neighbor attack" poses major challenges for cybersecurity experts, as it requires them to consider the security of neighboring networks as part of their threat landscape.

    The ability to launch these attacks from afar widens the pool of attackers and makes it harder to determine who is behind an attack.

    To counter this new threat, experts recommend limiting Wi-Fi range, obfuscating network names, etc.

    Facebook
    Whatsapp
    Twitter
    Linkedin
    Related News
    Latest
    Russia
    Cybercrimes
    Cybersecurity

    Latest

    Bangladesh Cricket Board pondering over Bangladesh's tour of Pakistan Bangladesh Cricket Board
    Why Virat Kohli's presence could lift India in England? Stats Virat Kohli
    Google Workspace accounts gain access to Gemini Live feature Google
    Adani Group deploys India's 1st hydrogen-powered truck in Chhattisgarh Adani Group

    Russia

    G7 Summit: What's on PM Modi's agenda?  Narendra Modi
    London hospitals postpone 1,600 operations and appointments after Russian cyberattack United Kingdom
    Mozilla reinstates Firefox add-ons in Russia amid regulatory pressure Technology
    ISIS-linked prisoners take guards hostage in Russian detention center Moscow

    Cybercrimes

    Mobile scams on the rise: How to protect yourself National Crime Records Bureau
    Gurugram Police arrests duo for running job scam pan-India Gurugram
    How to identify online job scams and avoid them Cybersecurity
    Beware of these parcel fraud scams, ICICI Bank warns ICICI Bank

    Cybersecurity

    Update your browser! Critical vulnerabilities found in Microsoft Edge Microsoft Edge
    Internet Archive suffers major data breach, 31 million users affected Data Leak
    Star Health faces ₹57L ransom demand after significant data breach Cybercrimes
    Internet Archive returns after cyberattack as a read-only service Cybercrimes
    Indian Premier League (IPL) Celebrity Hollywood Bollywood UEFA Champions League Tennis Football Smartphones Cryptocurrency Upcoming Movies Premier League Cricket News Latest automobiles Latest Cars Upcoming Cars Latest Bikes Upcoming Tablets
    About Us Privacy Policy Terms & Conditions Contact Us Ethical Conduct Grievance Redressal News News Archive Topics Archive Download DevBytes Find Cricket Statistics
    Follow us on
    Facebook Twitter Linkedin
    All rights reserved © NewsBytes 2025