The team provides a code breakdown of how they successfully created a Man-in-the-Middle (MITM) attack. It is a detailed proof-of-concept which shows a workable capability, but not refined code intended to do longstanding harm. The codebase, most Python, is available to the public.
In essence, an attacker armed with this code and some basic skills could sit at Starbucks and conduct the attack on unsuspecting victims who trust connecting to open WiFi access points. The victim’s systems would then mine cryptocurrency while browsing the Internet at that location. Truly malicious hackers could use this method to inject other types of malware on victim’s systems that could cause much more harm and persist long after they had left.
So beware when you connect to open WiFi networks, there may be someone ready to pounce on your gullibility.
Interested in more? Follow me on your favorite social sites for insights and what is going on in cybersecurity: LinkedIn, Twitter (@Matt_Rosenquist), YouTube, Information Security Strategy blog, Medium, Golos, and Steemit