Press release
Sophos Reveals London's Wifi Security Issues With 'Warbiking' Experiment
27 percent of nearly 107,000 wireless hotspots found to have poor, or no securityComplete security leader Sophos announced the findings from a recent practical experiment into WiFi security covering the city of London. The experiment was conducted over two days by Sophos' director of technology strategy, James Lyne. The project involved using a bike equipped with dynamos and solar panels to power a computer designed to scan for wireless networks - a technique known as 'wardriving', or in this case 'warbiking'. In addition, a GPS-enabled device allowed the creation of a 'heat' map, depicting levels of security of wireless networks around central London.
Lyne passed more than 1,000 wireless hotspots for every mile he rode, and found that at least one in four had poor security. Analysing the geographic mapping of the hotspots and the level of security they demonstrated revealed some interesting trends. Residential areas largely had reasonable default configurations - although many devices had default network names like 'SKY-XYZ123', they often had the strong 'WPA2' encryption standard enabled. At a micro level, the worst offending areas, consistently across London, were streets with collections of small businesses.
Of the overall number of networks, 9 percent were using default network names with no random element, such as 'default' or the vendor name. This makes password hacking even faster. This figure increased to 21 percent if networks which used the default name but which had some random element per device, e.g. 'Default-165496' are included. These figures excluded default names of obviously identifiable, intentionally open hotspots such as those in hotels and cafes. Some providers offering packaged solutions with a plug and play router generate truly random names by default, and supply these on a sticker on the bottom of the router. It's therefore reassuring to see some vendors following best practice here, helping consumers in particular to be more secure out of the box.
More detail and a video showing the warbiking experiment can be found on the Sophos website here: www.sophos.com/warbiking.
Crucially, Sophos only collected high level data within the confines of the law, which revealed the general state of wireless security (and is therefore representative of awareness of steps taken to secure networks). However, it should be noted that cybercriminals have significantly more offensive tools in their armouries and could relatively easily take this exercise further.
"With the tools available we could have gone much further but we carefully stayed in the confines of the law. This exercise doesn't paint the complete picture, but it shows enough to demonstrate that security best practice and education still need a lot of focus." said James Lyne, director of technology strategy at Sophos.
"Pretty much every wireless device can be configured to use secure wireless networking out of the box, so poorly configured devices show a lack of awareness rather than a lack of capability to be secure," added Lyne. "It's easy to take simple steps to protect your wireless network, making it a far less attractive target for anyone trying to snoop on your internet activities or steal personal information. If an attacker gains access to a wireless network they can cause a lot of damage, such as intercepting usernames/passwords, taking control of computers on the network, changing browsing to websites (for example to deliver malware or capture credentials), or using the network to perform any manner of anonymous or illegal activities. Unfortunately many networks are still like a Rolo - hard on the outside but soft and gooey on the inside. Without good security as per our top tips, an organisation won't know they've been attacked until perhaps the police come knocking."
Top level findings of the project include:
- 106, 874 individual hotspots detected across more than 91 miles of central London
- 8 percent of the hotspots used no encryption and appear to be both home and business networks (this figure excludes a large number of coffee shops and other open hotspots which were identified by name of hotspot)
- 19 percent of the hotspots used the obsolete 'WEP' encryption
- The remaining networks used WPA or WPA2 encryption, which represents acceptable security, providing they are not configured with default or easy to guess passwords
Sophos was concerned that so many of the hotspots detected rely on the outdated WEP encryption standard. Using readily available tools, WEP passwords can typically be cracked in just a couple of minutes. This could enable attackers to join networks and directly attack computers or devices, as well as 'sniff' network traffic, for example viewing which websites are being visited, reading emails and capturing information such as passwords. It is likely these hotspots are older and haven't been reconfigured or changed for quite some time. Modern devices tend to come with a more secure configuration out of the box.
"Enabling an attacker access to your network like this also makes it possible for them to launch other nasty attacks like 'man in the middle'. This enables attackers to sniff your usernames, passwords or other sensitive data while you think you are using a secure and private connection," said Lyne. "The minimum level of protection on any wireless network is the implementation of WPA2 encryption and, even then, this can be redundant if a strong passphrase is not also used."
The Sophos experiment has no way of testing the strength of the passwords used, as no attempt was made to access any of them. However, there are tools available which can attack WPA2 protected networks with massive wordlists at high speed. Attackers would have no qualms about using such tools, so it is critical that organisations and individuals adhere to best practice when configuring their wireless networks. Businesses should also ensure they have appropriate configuration management, logging and anomaly detection capabilities so that their configuration remains standard across the office or geographic locations."
Moreover, most wireless routers will come with a default wireless network name (this is the name of the router as it appears on your computer when you try to connect to it. It's also known as the 'service set identification'
or 'SSID', which many users do not bother to change). Not changing this allows hackers to prepare default password look-up lists combined with common SSIDs which speed up the password cracking process drastically, enabling them to test vast numbers of passwords per second. Having a custom SSID increases the time it takes for an attacker to break your passphrase, but when changing it, organisations should also give thought to their selected name. Calling your wireless network 'Company X' may make you more of a target as you are so easily identifiable.
Coffee shops and public hotspots will often intentionally be open so users of such services should ensure they are configured to use a VPN, which protects their traffic irrespective of the potential hazards of attackers listening in.
There are some simple steps you can take to secure your wireless network:
1) Configure it to use WPA2
2) Change your default SSID
3) Use a secure password
You'll find more detailed tips on keeping your wireless network safe on the Sophos website here: www.sophos.com/warbiking
Middle East Press Contact:
Michelle Silva
Oak Consulting FZC
Mob: +971 50 781 8568
About Sophos
More than 100 million users in 150 countries rely on Sophos' complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, Sophos' award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs - a global network of threat intelligence centres.
Sophos is headquartered in Boston, US and Oxford, UK. More information is available at www.sophos.com.
Alpha Building - Office# 205
PO Box 500469
Dubai Internet City
Dubai, UAE
This release was published on openPR.
Permanent link to this press release:
Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.
You can edit or delete your press release Sophos Reveals London's Wifi Security Issues With 'Warbiking' Experiment here
News-ID: 235648 • Views: …
More Releases for WPA
Stable Design in Volatile Markets: The Core Logic of WPA Hash
Cryptocurrency markets go viral--at times too viral. Stocks go up and down at any given time and investors are not even sure of when to make a move. Nevertheless, WPA Hash demonstrates that even when the situation on the market becomes unpredictable, it is still possible to predict the earnings. WPA Hash is an opportunity to earn income daily and profitably on market volatility with the help of advanced cloud-computing…
Ecosystem-driven growth: WPA Hash's scalable architecture is attracting investor …
In 2025, the crypto-mining sector in the world is experiencing a new dawn. As competition increases and mining becomes more difficult investors are seeking platforms that offer true stability, transparency and value. WPA Hash has come out as one of the most reputable brands in this industry with a performance-based mining infrastructure meant to deliver sustainable profitability and investor trust.
Having the most advanced infrastructure, malleable contracts on mining, and user…
The WPA Hash-based mining model provides a sustainable profit solution for BTC, …
Mining is shifting from a high-barrier, high-volatility professional activity to a more efficient and sustainable system model. For long-term holders of BTC, XRP, and SOL, how to obtain more continuous returns without relying on frequent trading has become an important issue.
The WPA Hash-based mining model is a new solution proposed in this context.
Structural Changes in Mining Logic
Traditional mining models emphasize hardware investment and computing power scale. Participants need to bear…
WPA Hash Mining Enables Daily Profits for BTC, XRP, and SOL
Whether it's Bitcoin (BTC), Ripple (XRP), or Solana (SOL), simply holding these assets statically often fails to fully realize their value.
WPA Hash mining is offering a new possibility for mainstream crypto assets-allowing BTC, XRP, and SOL to generate continuous daily returns while being held.
The Core Operating Logic of WPA Hash Mining
WPA Hash integrates globally distributed computing power resources, systematically managing the complex mining and node operation process, and distributing profits…
Wet Process Analyzer (WPA) Market Key Players, Share and Forecast Outlook
"The global Wet Process Analyzer (WPA) market is projected to reach approximately $3.2 billion in 2024, with anticipated growth driving its value to around $5.7 billion by 2034. This represents a Compound Annual Growth Rate (CAGR) of 6.3% during the forecast period from 2025 to 2034."
Exactitude Consultancy., Ltd. released a research report titled "Wet Process Analyzer (WPA) Market". This report covers the global Wet Process Analyzer (WPA) market sales, sales…
WPA LSG And FT And NMS Market Insights by Growth, Emerging Trends and Forecast b …
WPA LSG And FT And NMS Market is expected to grow from USD 2.02 Billion in 2022 to USD 5.06 Billion by 2030, at a Compound Annual Growth Rate (CAGR) of 13.5% during the forecast period.
A wireless security standard called WPA offers both encryption and authentication. A lightweight signal gateway called an LSG makes it possible for devices on various networks to securely communicate with one another. A federated trust…