The Nearest Neighbor Attack demonstrates a transformative approach to exploitation of wireless systems. After failing to breach a primary target's network defenses, a Russian APT successfully accessed the networks of nearby neighbors, pivoted to wireless, and infiltrated their target's Wi-Fi network through these neighboring systems. This attack challenges the long-held belief that proximity is necessary for wireless attacks. In a world saturated with wireless devices, proximate attack nodes are readily available.
Join us to delve into the specifics of the Nearest Neighbor Attack and explore other recent threats including Pegasus spyware leakage, drone-delivery attacks, data center exfiltration, etc. We’ll also discuss defensive strategies including wireless monitoring, informed network access control, and robust wireless security hygiene.
Learning Objectives:
Describe the specifics of the Nearest Neighbor Attack and how to defend against it
List examples of state of the art wireless attacks from the news, researcher reports, and field assessments
Describe how to enhance visibility in the wireless domain and other techniques for shoring up their wireless security posture