Wednesday, May 22, 2024

Warshipping – A new Attack type to Hack into Corporate or Personal Networks

Warshipping is a new form of attack that counters the limitations with wardialing and wardriving techniques and improves the accuracy dramatically.

An attacker could gain access to the system remotely from anywhere all they need is to ship a tiny device in the package to their victims to get access to their network.

“IBM X-Force Red investigated how cybercriminals might seek to exploit package deliveries to hack into corporate or personal home networks right from the office mailroom or someone’s front door.”

Warship Device

The Warshipping device is the cheap and small single-board computer (SBC) that can run on run cell phone battery level.

“The device, a 3G-enabled, remotely controlled system, can be tucked into the bottom of a packaging box or stuffed in a child’s teddy bear and delivered right into the hands or desk of an intended victim.”

X-Force team built these warshipping devices, those devices are not only cheap, but it can also be easily built by an average level cybercriminal.

“Using a command-and-control (C&C) server we created for the task, the devices we had set up securely checked for a specific file on the server to determine if they should stay on or go back to sleep. With off-the-shelf components, this do-it-yourself (DIY) “hacks and crafts” project can cost a cybercriminal under $100.”

With the warship device, attackers can launch wireless attacks by just being shipped by someone at the doorstep. the device also transmits it’s GPS coordinates to the C&C server.

Once the warship device placed in the target environment. the attackers can able to remotely control the system and attempts to hack the wireless networks.

“With our warship device, we could also launch other active wireless attacks, such as a deauthentication attack or “evil twin” Wi-Fi attack. By launching an evil twin Wi-Fi network, we could then set up a rogue Wi-Fi network with the warship device and coax our target to join our new decoy network,” reads the IBM X-Force report.

Protection Against Warshipping Attacks

  • Treat your packages like you would treat a visitor
  • Set a package policy for employees
  • Only connect to trusted wireless networks
  • Avoid using preshared keys in corporate environments
  • Consider a package scanning process for large mailrooms
  • Hire a hacking service
  • Set a package policy for employees
  • Signal strength is not a security control; do not count on it

Sponsored:  – Manage all the Endpoint networks from a single Console.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.


Latest articles

Hackers Claiming Access to Qatar National Bank Database

A group of hackers has claimed to have accessed the database of Qatar National...

Cloud-Based Malware Attack Abusing Google Drive & Dropbox

A phishing email with a malicious zip attachment initiates the attack. The zip contains...

OmniVision Technologies Cyber Attack, Hackers Stolen Personal Data in Ransomware Attack

OmniVision Technologies, Inc. (OVT) recently disclosed a significant security breach that compromised its clients'...

Critical Flaw In Confluence Server Let Attackers Execute Arbitrary Code

The widely used team workspace corporate wiki Confluence has been discovered to have a...

Threat Actors Leverage Bitbucket Artifacts to Breach AWS Accounts

In a recent investigation into Amazon Web Services (AWS) security breaches, Mandiant uncovered a...

Hackers Breached Western Sydney University Microsoft 365 & Sharepoint Environments

Western Sydney University has informed approximately 7,500 individuals today of an unauthorized access incident...

Memcyco Report Reveals Only 6% Of Brands Can Protect Their Customers From Digital Impersonation Fraud

Memcyco Inc., provider of digital trust technology designed to protect companies and their customers...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles