Branded Dotted Block Graphic - Dynamic Networks Group
Branded Three Diagonal Stripes Graphic - Dynamic Networks Group
Branded Plus Grid Graphic - Dynamic Networks Group

Cyber Security Spotlight: Eavesdropping Attacks

In the first of our cyber security spotlight blogs we’re taking a look at eavesdropping attacks to help you understand this particular type of common cyber attack and how to avoid it.
Cyber Security Spotlight: Eavesdropping Attacks

What is it?

Also known as a sniffing or snooping attack, an eavesdropping attack occurs when someone takes advantage of unsafe or unsecure network communications to steal information shared or sent through digital devices. These attacks tend to be successful too, because no abnormalities can be identified in the network transmissions themselves. It can be used to capture everything from important passwords to credit card details and sensitive personal information so it’s something that both businesses and individuals need to take seriously.

How does it work?

To carry out an eavesdropping attack, cyber criminals must take advantage of a weak network connection that will allow them to transfer network signals to themselves. This is done by installing network monitoring software (sniffers) either on a PC or server, that handles the attack and catches the data being transferred. Wi-fi hotspots and websites that do not run over HTTPS are the most common examples of weak or unsecure networks that are vulnerable to eavesdropping.

How can you protect against it?

As we mentioned already, eavesdropping attacks are incredibly hard to detect and as a result, the best protection against eavesdropping is prevention and avoidance. That essentially means taking a proactive approach to your online security. Some top tips to help avoid eavesdropping include using personal firewalls, keeping all antivirus software up to date, using VPNs and avoiding public networks, particularly for sensitive transactions like banking.

Previous examples of eavesdropping attacks…

Wireshark was a sniffing program that caused Android smartphone users a big headache back in 2011. The attack involved authentication tokens which were sent over an unencrypted Wi-Fi network and this allowed Wireshark to view, steal, modify and even delete private data, which in turn meant users could be tricked into handing over more sensitive data directly to the attacker.

iOS users had their fair share of trouble too though, this time in 2015 when over 25,000 iOS apps were vulnerable to eavesdropping attacks thanks to a bug in the open source code library AFNetworking. The bug meant HTTPS encryption could actually be taken down!

So there you have it, a mini overview of eavesdropping attacks and how to avoid them. If you think your business needs better cyber security don’t rest on your laurels, contact our team today.

Dynamic Insights & advice

Dynamic Networks completes a Management Buyout and commences its acquisition strategy.

"David Smith (CEO) and Gareth Leece (COO) have successfully completed an MBO of Dynamic Networks, working with Paul Landsman of Kingland Capital. The MBO provides for a simplification of the Board structure to allow for its continued accelerated growth strategy. The additional investment secured through Kingland Capital provides a significant fund for the Management Team to hire likeminded industry professionals in-line with its hiring plan and also acquire complimentary Cloud Managed Service Providers as they continue their objective to be one of the fastest growing MSP’s in the UK with a strong reputation for quality service. Further announcements to follow."