Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
travelers to be on the lookout for malware on their hotel's wireless connection.
According to the alert, attackers are using the hotel's Wi-Fi hotspot to distribute malware to guests under the guise of a security update.
The alert was issued by the Internet Crime Complaint Center (IC3), a partnership between the Federal Bureau of Investigation and the National White Collar Crime Center, and funded by the Bureau of Justice Assistance.
"In these instances, the traveler was attempting to set up the hotel room Internet connection and was presented with a pop-up window notifying the user to update a widely-used software product," the alert said.
"If the user clicked to accept and install the update, malicious software was installed on the laptop. The pop-up window appeared to be offering a routine update to a legitimate software product for which updates are frequently available."
Adversaries have heavily targeted the hospitality industry in recent years. In 2011, security firm Trustwave conducted more than 25 forensic investigations into compromises at hotels.
Nicholas Percoco, who heads the company's SpiderLabs research arm, told SCMagazine.com on Wednesday that hotels, thanks to weak passwords, unpatched systems or network segmentation issues, often are wide open to attack.
"It would not be a difficult feat to get something installed within the hotel network that would basically man-in-the-middle guests' web traffic," he said.
"The attackers could then transparently modify HTTP responses to contain pop-up boxes asking users to download updates for their computer or web browser. If a user performed what the attackers asked them to do, this could be an easy way to get a backdoor on their systems to provide remote access into victim's computer."
IC3 did not say how the attackers were able to perform the ruse, or which hotels were affected. In the past, experts have encouraged users to be wary of fake Wi-Fi access points in places like hotels and airports.
The note asked travelers to try to install any necessary security updates before leaving for a trip, or at least visit the software vendor's website directly to download.
This article originally appeared at scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.