Find the malicious hardware targeting your network
With the decrease in hardware cost and increasing technical knowledge, criminals can easily build cheap, easy to use devices that can capture sensitive data, breach networks, compromise existing security solutions, attack devices and networks, and more. Pulse analytics immediately detects and alerts for rogue devices that can compromise your network.
What is a rogue device?
- Purpose built, application specific devices designed to capture passwords, credit and debit cards numbers, pins, keystrokes, and confidential or proprietary data
- Devices designed to breach WiFi networks, wireless access points, wireless/mobile client devices and Bluetooth devices
- Devices built to compromise the security of cellular networks
- Devices designed to attack other commonly used RF technologies
All it takes to build or buy a rogue device is $20 and an Internet connection
Pulse detects rogue devices like:
Keyloggers — traditionally found in malware and trojans — allow for the storing of all keystrokes entered by the victim on the compromised machine. Criminals are now leveraging remote connectivity methods (such as WiFi or Bluetooth) to offload or exfiltrate their capture information.
Rogue (evil) Access Points
Rogue/Evil Access Points — or unauthorized and unmanaged WiFi devices — can spell the end for even the most mature of Information Security programs. Rogue APs can take many forms: non-malicious employees plugging in their own Access Points for convenience, mis-or-unconfigured Wirelessly-enabled printers, or a $25 USB WiFi card that can be leveraged by criminals to stand up Fake Access Points from the parking lot.
Evil Access Points can defeat even the most stringent WIPS/WIDS deployments, and with minimal cost and effort, any criminal can set up an EvilAP to lure — or even force — unsuspecting employees into joining fake wireless networks masquerading as legitimate networks.
WiFI and Bluetooth Hacking Gear
WiFi and Bluetooth Hacking gear can capture authentication handshake, sniff BYOD Bluetooth traffic, eavesdrop on wireless phone calls, and more by exploiting weaknesses in Access Points, Wireless Encryption, and the Bluetooth protocol.
Hacking and Pentesting Dropboxes
Drop boxes consist of both purpose-bought hardware or rigged routers. Most criminals can set up a dropbox to stand up Evil APS, run wireless attacks from within the office, and cause serious damage from inside the network.
Mobile (Cellular) Hacking Gear
For less than $2000, criminal attackers can leverage freely available software along with Software Defined Radios to trick cell phones into routing their connections through a fake cell tower. Once connected, the attacker can sniff the cellphone’s traffic, perform man-in-the-middle attacks, and even listen in on conversations.
Wireless Card Skimmers
Many credit card skimmers today are wirelessly enabled to expedite criminal data collection.
Pulse has built-in rogue device rules that will immediately alert you to the presence of malicious hardware on or around your network.
Pulse Analytics automatically detects and alerts for malicious hardware on or around your network.