Hackers breach Wi-Fi network of U.S. firm from Russia — daisy chain attack jumps from network to network to gain access from thousands of miles away

White Wi-Fi logo on a computer icon overlaid by a skull over a red background
(Image credit: Shutterstock)

Russian hackers compromised the Wi-Fi of an organization located in the U.S. without needing to get into range of its wireless network. The attackers accomplished the feat by jumping from one Wi-Fi network to another until they finally reached the destination target. Cybersecurity firm Volexity detailed the attack on its blog after it discovered suspicious activity on a client’s computers (Company A).

The hackers were able to access their target by first compromising the network of a neighboring firm (Company B). In their first attack, they looked for a computer that was connected via Ethernet to the initially compromised network (Company B) but could also connect via Wi-Fi. From there, they connected to the wireless network of their final target (Company A). Another attack showed the hackers penetrating the network of a third company (Company C) to then connect to Company B’s Wi-Fi. They then used that connection to Company B to advance their cyberattack on Company A.

Attacks on Wi-Fi networks have been around for years, with one operation in 2018 making the news after it was discovered that Russian operatives were attempting to get into the wireless network of the Organization for the Prohibition of Chemical Weapons in The Hague by using equipment in the trunk of a car. However, this kind of daisy chain attack, called “nearest neighbor attack”, where the attackers use one or two different networks to compromise a third one, is unheard of. The discovery of this technique makes cybersecurity even more complicated, as you now have to consider the network (both wired and wireless) of organizations that are within range of your Wi-Fi access points.

Aside from that, this kind of remote skullduggery protects the attacker, as they no longer need to be in range of the target wireless network to access it. It also makes it harder to determine the source of the attack, as the use of multiple networks and devices obscures the original weak point in the system.

Some expert recommendations to help mitigate these kinds of attacks include: limiting the range of wireless access points to within the immediate vicinity of the area, hiding SSID names, and implementing mandatory multifactor authentication.

The average user does not need to worry about this type of attack, though, as it’s quite an intensive and sophisticated method used by nation-state actors. The only way you can truly secure a network or device in this day and age is if you air-gap it. But even then, researchers have found ways to snoop data from air-gapped systems using RAM sticks, for example.

Jowi Morales
Contributing Writer

Jowi Morales is a tech enthusiast with years of experience working in the industry. He’s been writing with several tech publications since 2021, where he’s been interested in tech hardware and consumer electronics.

  • kjfatl
    I'm not a fan of useless government regulations. That said, all civilized nation should require a minimal level of security on wired and wireless networks. If any device does not meet this security level, it should not be recognized by the network. Practical implementation of this is not a trivial matter, but it can be done without effecting usability of the network. In fact is likely to improve network performance.
    Reply
  • nrdwka
    kjfatl said:
    I'm not a fan of useless government regulations. That said, all civilized nation should require a minimal level of security on wired and wireless networks. If any device does not meet this security level, it should not be recognized by the network. Practical implementation of this is not a trivial matter, but it can be done without effecting usability of the network. In fact is likely to improve network performance.
    The issue can EoL devices (as recent Dlink breach ).
    There is high amount of not-up-to-date or EoL WiFi points around. And it is beyond reasonable expectation to have them all updated and, especially , replaced.
    Reply
  • jp7189
    kjfatl said:
    I'm not a fan of useless government regulations. That said, all civilized nation should require a minimal level of security on wired and wireless networks. If any device does not meet this security level, it should not be recognized by the network. Practical implementation of this is not a trivial matter, but it can be done without effecting usability of the network. In fact is likely to improve network performance.
    To protect against this you have to do multi factor on wifi, which basically means per device or per user certs, which requires a pki and an automated method of managing said certs. This is not trivial for many small companies.
    Reply