As travelers increasingly rely on free Wi-Fi networks in airports and cafes, cybercriminals are perfecting a dangerous tactic known as “evil twin” attacks, and cybersecurity experts are urging the public to heed warnings. The lure of quick and easy internet access while on the move is proving irresistible not just to users but also to hackers.
“Evil twin” attacks, a form of Man-in-the-Middle cybercrime, involve setting up fake Wi-Fi networks that appear legitimate but are designed to steal personal data. In a high-profile case in Australia, a man was arrested earlier this year after allegedly using this method to target travelers at domestic airports in Perth, Melbourne, and Adelaide. His fake networks tricked users into entering their email or social media credentials, which were then harvested for later use.
This case has raised concerns in the UK and beyond that such attacks are becoming more frequent and harder to detect. As Matt Radolec, Vice President of Incident Response at data security firm Varonis, points out, people have become too comfortable with connecting to free Wi-Fi without checking the legitimacy of the network. “Nobody reads the terms and conditions, and very few users verify URLs before clicking ‘connect’,” he warns.
Sophisticated and Harder to Detect
The rise of miniaturized technology has made evil twin attacks easier for hackers to carry out. Small, easily concealable devices can now be used to create convincing copies of legitimate Wi-Fi networks. These devices, costing less than £400, can be hidden behind displays in coffee shops or tucked into quiet corners of airport lounges. They then present users with a valid-looking login page to steal their details, often without raising suspicion.
Cincinnati-based IT consultant Brian Alcorn highlights how quickly unsuspecting travelers can fall victim to such attacks. “Once you’ve entered your details, even if you don’t log in properly, the damage is already done,” Alcorn says. “Most people just assume the Wi-Fi is faulty and don’t give it a second thought.”
How to Protect Yourself
The growing threat has left many wondering how to safeguard their data. Brian Callahan, Director of the Rensselaer Cybersecurity Collaboratory, suggests the simplest solution is to avoid public Wi-Fi altogether. Instead, users should rely on their own mobile hotspots, which they can set up and secure with strong passwords.
For those who need to use public Wi-Fi, Callahan recommends a Virtual Private Network (VPN) to encrypt data and protect against prying eyes. “With a VPN, even if someone is monitoring the connection, they won’t be able to access your data,” he explains.
Despite the warnings, public Wi-Fi remains a central feature at many major airports. For instance, Dallas Fort Worth International outsources its Wi-Fi service to Boingo, a provider for around 60 airports in North America. Boingo says it uses technology like Passpoint to authenticate networks and protect users from rogue hotspots, but the responsibility still lies with passengers to ensure they’re connecting safely.
The UK Perspective
While evil twin attacks are not new, the sophistication of these schemes has increased. According to Alcorn, these attacks are becoming more common in the United States and Europe, though most perpetrators go undetected. “Many evil twin attacks are experimental, carried out by novices just to see if they can get away with it,” he says.
In the case of the Australian arrest, what was shocking wasn’t the method, but the fact that the attacker was caught. Aaron Walton, a threat analyst at Expel, a security company, says, “Airports and airlines aren’t usually equipped to handle hacking incidents. The lack of arrests should serve as a reminder for travellers to remain vigilant.”
Indeed, the Australian Federal Police found that dozens of people had their credentials stolen. Once hackers obtain login details, it’s not just email or social media accounts at risk – bank details and other sensitive information can be compromised too.
A Few Victims Is All It Takes
The ease with which hackers can exploit public Wi-Fi networks is alarming. In a busy airport, they don’t need to deceive every traveler – just a handful of successful connections can yield enough valuable data to make the effort worthwhile.
“We expect Wi-Fi everywhere we go, especially in places like airports,” says Callahan. “All an attacker needs is for a few people to connect to their fake network and input credentials.”
The next time you’re at an airport, the only way to be 100% sure of your online safety is to bring your own internet connection. Whether through a mobile hotspot or a VPN, being cautious can mean the difference between a safe trip and one compromised by cybercrime.
As the risks continue to grow, the message from cybersecurity experts is clear: It’s time to take public Wi-Fi warnings seriously – especially in airports, where harried travelers make easy targets for increasingly sophisticated attacks.