Man arrested for using evil twin Wi-Fi network in airports to swipe travelers' data

Skye Jacobs

Posts: 36   +0
Staff
Why it matters: An Australian man has been charged with stealing unsuspecting users' data by setting up fake Wi-Fi networks using portable wireless access points in several public places, including airports. He was caught when an airline noticed the suspicious network and summoned authorities. The incident underscores how important it is to remain vigilant about Internet security no matter how impatient you are to log online.

Western Australian national Michael Clapsis from Perth appeared in the Magistrates Court last week. He faces nine charges of cybercrime violations for allegedly setting up fake public Wi-Fi networks at multiple locations across the country to swipe unsuspecting users' data. He had been arrested earlier this spring. After his court appearance, he was released on strict bail conditions.

Clapsis had set up several portable wireless access points to create so-called 'evil twin' free Wi-Fi networks, which raised alarms for a domestic airline that spotted the suspicious network during a flight. The Australian Federal Police searched Clapsis' luggage and seized a number of electronic devices. They also searched his Palmyra home.

When people tried to connect their devices to the free networks, they were taken to a fake website that required them to log in using their email or social media accounts, according to the AFP. Western Command Cybercrime Detective Inspector Andrea Coleman warned the public that when connecting to free public Wi-Fi you shouldn't have to enter any personal details, such as logging in through an email or social media account.

Clapsis allegedly saved the details and may have used them to access more of the users' personal information, including stored images and bank details.

The fake Wi-Fi access points were deployed at airports in Perth, Melbourne, and Adelaide, on domestic flights, and at locations linked to Clapsis' previous employment.

The incident highlights the dangers of using public Wi-Fi networks. Typically, evil twin attacks work by the hacker setting up a fake Wi-Fi access point that mimics a legitimate network, using the same Service Set Identifier (SSID) name. They may use devices like smartphones, laptops, or specialized tools like a Wi-Fi Pineapple to create this fake network. Once the user connects, the attacker presents a fake portal to capture login credentials or other sensitive information.

These attacks are particularly dangerous because they're difficult to detect and play on people's need for an immediate Internet connection no matter where they are. In addition, many devices are set to automatically connect to known networks.

To avoid these attacks, never use unsecured public Wi-Fi networks, or if you must, use a VPN to connect. Also, disable auto-connect features on your devices, and only browse HTTPS websites when connected to a public Wi-Fi network.

Permalink to story:

 
Seems a bit dim witted doing it at airports where it is almost inevitable someone is going to notice and police will take it seriously. They don't put phone calls from airport security on the back burner, do they?

Probably worked fine when he did it small time at cafes, shops or restaurants etc and he just got too ambitious.
 
Crime's like this are and should be treated much more seriously. Minimum sentences starting at 20 years w/o parole should be enforced and when the crime causes others to loose their retirement savings, medical money, etc. then the punishment of life in prison to execution should be mandatory. The criminal deserves punishment no less than they have inflicted on others.
 
I run a VPN server at home so when I connect to a public WiFi I tunnel securely to my home server and then out to the Internet secured by my home security measures. This way I don't need to pay for a VPN but get all the security and it always appears that I am at home accessing the Internet.

Some home routers have this built in and can be enabled.
 
That's why I never connect to wifi networks, and just pay for data .
You can also turn wifi BT ,nfc off to reduce attack vectors as well.

The man in the middle and misinformation attack is 100s millions of years old.
Species have been mimicking others to get/steal the rewards for a long time.
The example we all know is a cuckoo.
If if you are biblical the hairy son story to get his fathers birthright
 
Seems a bit dim witted doing it at airports where it is almost inevitable someone is going to notice and police will take it seriously. They don't put phone calls from airport security on the back burner, do they?

Probably worked fine when he did it small time at cafes, shops or restaurants etc and he just got too ambitious.
The reasoning behind doing it at an airport is probably because travellers are likely to make use of free WiFi. It wouldn’t be as effective in cafes or shopping centres because most people would be simply using the 4G/5G data connection through their phone.
 
Back