CAPEC Details
Name Evil Twin Wi-Fi Attack
Likelyhood of attack Typical severity
Low Low
Summary Adversaries install Wi-Fi equipment that acts as a legitimate Wi-Fi network access point. When a device connects to this access point, Wi-Fi data traffic is intercepted, captured, and analyzed. This also allows the adversary to use "adversary-in-the-middle" (CAPEC-94) for all communications.
Prerequisites None
Solutions Commercial defensive technology that monitors for rogue Wi-Fi access points, adversary-in-the-middle attacks, and anomalous activity with the mobile device baseband radios.
Related Weaknesses
CWE ID Description
CWE-300 Channel Accessible by Non-Endpoint
Related CAPECS
CAPEC ID Description
CAPEC-616 An adversary provides a malicious version of a resource at a location that is similar to the expected location of a legitimate resource. After establishing the rogue location, the adversary waits for a victim to visit the location and access the malicious resource.