Australian cities exposed in war driving exercise

28.11.2005
A state-by-state war driving exercise undertaken in October across Australia's capital cities identified the risk of corporate network intrusions through weak Wireless Local Area Networks (WLAN,).

It found an alarmingly high number of organizations are making their corporate networks easy targets for hackers.

The inaugural Altiris/SpectroTech 2005 IT Security Vulnerability Report covered the central business districts of Adelaide, Brisbane, Canberra, Hobart, Melbourne, Perth and Sydney. As connecting to a corporate network is illegal, SpectroTech used passive tools to blindly capture and collate the data.

"These results were a big surprise to us because everyone is at risk," said SpectroTech principal consultant Mark Morgan. "You would be shocked if you heard the names of the major Australian organizations that we picked up."

The results showed 18 percent of CBD based organizations are using default configuration settings for their wireless access points. Melbourne was at the highest risk with 18 percent followed by Hobart (14 percent) and Canberra (13 percent).

"Either companies don't have the knowledge and expertise to design or configure secure solutions or there are rogue devices running rampant on these networks," Morgan said.

Rogue devices are intrusions on networks that are implemented either internally or externally without permission from network administrators. The only way to ensure a network's security is to perform audits and threat analyses in threat environments, said Morgan.

Laura Chappell, IT security expert and FBI consultant, said default settings, which include usernames and passwords, are easily found on the Internet.

"From here, a hacker can simply go in and gain access to your corporate network," she said.

Nearly 30 percent of companies made no attempt to protect their business information at all with no encryption keys used to access the wireless network. "This means that clear-text communications over the wireless network can easily be intercepted and read," Chappell said.

"Adelaide's CBD-based companies are the biggest offenders at 36 percent. This figure is extremely high. If confidential information is crossing the wireless network in plain text, then that's handing corporate secrets to the competition on a platter."

However, Morgan warned that encryption statistics can be misleading and do not necessarily indicate an insecure system.

"Just because data is encryption disabled does not necessarily mean that it is insecure. Many companies do not need to be concerned with the confidentiality of the data they send," he said.

Regardless of the needs of corporate encryption, the report found that an estimated 70 percent of companies within the CBD of all major Australian cities rely on the rudimentary security mechanism, Wired Equivalent Privacy (WEP) to provide authentication and encryption.

Developed as an industry standard and used primarily for encryption, WEP is riddled with flaws and can be cracked in a matter of seconds said Morgan.

"There are a lot of misconceptions about the inherent technology in wireless networks," Morgan said. "Because it's a rapid growth technology, a lot of people sell but few people focus on the design, implementation and support elements."

Only 13 percent of companies were found to be using Temporal Key Integrity Protocol (TKIP), an enhanced version of WEP.

"It all comes down to education. The report shows that the reliance on default configurations and outdated industry standards is leaving corporate networks wide open for attack," Morgan said.

Spectrotech plan to host a national road show early next year to re-educate CIOs and network administrators on the dangers of insecure networks. The vendor neutral consultancy group will provide live hacking demonstrations and offer security solutions from its partners.

(Additional reporting by Mitchell Bingemann.)