CAPEC-615 Evil Twin Wi-Fi Attack

CAPEC ID: 615

CAPEC-615 Metadata

Likelihood of Attack

Low

Typical Severity

Low

Overview

Summary

Adversaries install Wi-Fi equipment that acts as a legitimate Wi-Fi network access point. When a device connects to this access point, Wi-Fi data traffic is intercepted, captured, and analyzed. This also allows the adversary to use "adversary-in-the-middle" (CAPEC-94) for all communications.

Prerequisites

None

Potential Solutions / Mitigations

Commercial defensive technology that monitors for rogue Wi-Fi access points, adversary-in-the-middle attacks, and anomalous activity with the mobile device baseband radios.

Related Weaknesses (CWE)

CWE ID Description
CWE-300 Channel Accessible by Non-Endpoint

Related CAPECs

CAPEC ID Description
CAPEC-616 An adversary provides a malicious version of a resource at a location that is similar to the expected location of a legitimate resource. After establishing the rogue location, the adversary waits for a victim to visit the location and access the malicious resource.

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.