Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Apple just added more frost to its Liquid Glass design

    July 7, 2025

    The next Switch 2 restock kicks off at 7PM ET online at Walmart

    July 7, 2025

    Tesla’s real struggles have only just begun

    July 7, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack
    Security

    Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack

    News RoomBy News RoomNovember 23, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    Only after the next intrusion, when Volexity managed to get more complete logs of the hackers’ traffic, did its analysts solve the mystery: The company found that the hijacked machine which the hackers were using to dig around in its customer’s systems was leaking the name of the domain on which it was hosted—in fact, the name of another organization just across the road. “At that point, it was 100 percent clear where it was coming from,” Adair says. “It’s not a car in the street. It’s the building next door.”

    With the cooperation of that neighbor, Volexity investigated that second organization’s network and found that a certain laptop was the source of the street-jumping Wi-Fi intrusion. The hackers had penetrated that device, which was plugged into a dock connected to the local network via Ethernet, and then switched on its Wi-Fi, allowing it to act as a radio-based relay into the target network. Volexity found that, to break into that target’s Wi-Fi, the hackers had used credentials they’d somehow obtained online but had apparently been unable to exploit elsewhere, likely due to two-factor authentication.

    Volexity eventually tracked the hackers on that second network to two possible points of intrusion. The hackers appeared to have compromised a VPN appliance owned by the other organization. But they had also broken into the organization’s Wi-Fi from another network’s devices in the same building, suggesting that the hackers may have daisy-chained as many as three networks via Wi-Fi to reach their final target. “Who knows how many devices or networks they compromised and were doing this on,” says Adair.

    In fact, even after Volexity evicted the hackers from their customer’s network, the hackers tried again that spring to break in via Wi-Fi, this time attempting to access resources that were shared on the guest Wi-Fi network. “These guys were super persistent,” says Adair. He says that Volexity was able to detect this next breach attempt, however, and quickly lock out the intruders.

    Volexity had presumed early on in its investigation that the hackers were Russian in origin due to their targeting of individual staffers at the customer organization focused on Ukraine. Then in April, fully two years after the original intrusion, Microsoft warned of a vulnerability in Windows’ print spooler that had been used by Russia’s APT28 hacker group—Microsoft refers to the group as Forest Blizzard—to gain administrative privileges on target machines. Remnants left behind on the very first computer Volexity had analyzed in the Wi-Fi-based breach of its customer exactly matched that technique. “It was an exact one-to-one match,” Adair says.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleThe Best MagSafe Accessories for Your New iPhone
    Next Article You can save $10 on Google’s 4K-ready Chromecast before it’s gone for good

    Related Posts

    The Promise and Peril of Digital Security in the Age of Dictatorship

    July 5, 2025

    Identities of More Than 80 Americans Stolen for North Korean IT Worker Scams

    July 3, 2025

    A Group of Young Cybercriminals Poses the ‘Most Imminent Threat’ of Cyberattacks Right Now

    July 3, 2025

    How to Protest Safely in the Age of Surveillance

    July 3, 2025

    US Supreme Court Upholds Texas Porn ID Law

    July 3, 2025

    ICE Rolls Facial Recognition Tools Out to Officers’ Phones

    July 3, 2025
    Our Picks

    The next Switch 2 restock kicks off at 7PM ET online at Walmart

    July 7, 2025

    Tesla’s real struggles have only just begun

    July 7, 2025

    Bluesky can really keep up with the news now that it has activity notifications

    July 7, 2025

    Epic reaches mystery settlement with Samsung days before new Galaxy phones

    July 7, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    Apple’s latest AirPods are already on sale for $99 before Prime Day

    By News RoomJuly 7, 2025

    Amazon Prime Day kicks off tomorrow, July 8th, but you don’t have to wait until…

    Is It Time to Stop Protecting the Grizzly Bear?

    July 7, 2025

    How SharkNinja took over the home, with CEO Mark Barrocas

    July 7, 2025

    Apple’s 5th Ave store spray-painted to protest ‘climate hypocrisy’

    July 7, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.