{"id":8279,"date":"2015-04-10T11:59:42","date_gmt":"2015-04-10T15:59:42","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=8279"},"modified":"2020-02-26T11:01:15","modified_gmt":"2020-02-26T16:01:15","slug":"smart-wifi-vkontakte-credentials","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/smart-wifi-vkontakte-credentials\/8279\/","title":{"rendered":"How to pay for &#8216;free wifi&#8217; with your social network account password"},"content":{"rendered":"<p>In theory, it\u2019s common knowledge that \u201cthere\u2019s no such thing as a free lunch\u201d, but when it comes to practice, some forget about the \u2018free lunch\u2019 proverb and prefer another proverbial saying, which employs a \u2018free ride\u2019 idiom. In today\u2019s story about free WiFi, you will see that when searching for a \u2018free ride\u2019 opportunity with a service provider, you are very likely to inadvertently share your private data, like your social network credentials, with third parties.<\/p>\n<p>There are a <a href=\"https:\/\/www.kaspersky.com\/blog\/wi-fi-sao-paulo\/4351\/\" target=\"_blank\" rel=\"noopener nofollow\">number of real-life examples<\/a> proving you should not be tempted by \u2018free lunch\u2019 offers. One of the most recent stories is a case involving free WiFi hotspots supplied to cafes by Smart Wi-Fi, a Russian company based in St. Petersburg. Conscious users managed to record several videos showing how this approach works when a customer logs into the Smart Wi-Fi network, and <a href=\"https:\/\/www.youtube.com\/watch?v=g8T3FIzf0ec\" target=\"_blank\" rel=\"noopener nofollow\">posted them on YouTube<\/a>.<\/p>\n<p>The full story is available in this detailed <a href=\"http:\/\/siliconrus.com\/2015\/03\/smart-steal\/\" target=\"_blank\" rel=\"noopener nofollow\">article on Siliconrus.com<\/a> (it\u2019s written in Russian, so feel free to use an online translator), but we\u2019ll explain\u00a0the technology:\u00a0When connecting to a Smart Wi-Fi network, a customer is prompted to authorize via their social network account profile. In this particular case the account would be in VKontakte, which is the most popular social network in Russia.<\/p>\n<p>However, the login and the password are entered not on the vk.com page, but on the Smart Wi-Fi website, through the unencrypted connection, which is the most insecure way of logging in to any site.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>\u201cFree\u201d #WiFi in exchange for your social network account #password<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F2e8W&amp;text=%26%238220%3BFree%26%238221%3B+%23WiFi+in+exchange+for+your+social+network+account+%23password\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>So when users log in with their VK profile, the vk.com password is supplied to the Smart Wi-Fi provider and, coincidently, to any culprit armed with a laptop and lurking nearby.<\/p>\n<p>As far as Smart Wi-Fi is concerned, there is an <a href=\"http:\/\/siliconrus.com\/2015\/03\/smart-steal\/\" target=\"_blank\" rel=\"noopener nofollow\">article<\/a> \u2013 and the aforementioned videos \u2013 which prove that the service stores credentials and uses them to, in one instance, post an ad on the customer\u2019s page on VK.com, and in another instance, to install an app onto a vk.com profile with a very broad scope of permissions, including access to a wide range of personal data and the right to publish updates on behalf of the user.<\/p>\n<p>Whereas in the first case the user is warned about the ad being posted on their \u2018wall\u2019, the second action with app installation is made without any notice at all. In order to find out about this app, a user would have to\u00a0review their list of Vkontakte apps. It goes without saying that the\u00a0number of users who do this on a regular basis is incredibly low.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Why <a href=\"https:\/\/twitter.com\/hashtag\/phishing?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#phishing<\/a> works and how to avoid it \u2013  <a href=\"https:\/\/t.co\/ksAYI9g2Jm\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/ksAYI9g2Jm<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/security?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#security<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/cybercrime?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#cybercrime<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/517329359859118080?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 1, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Webpages which mimic a login page of a social network or an online banking tool are very common. In fact, it is a cornerstone of one <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-avoid-phishing\/5411\/\" target=\"_blank\" rel=\"noopener nofollow\">widely used scam known as \u2018phishing\u2019<\/a>. This technique uses the\u00a0creation of fake web pages, which masquerade as legitimate sites, to lure users into entering their credentials which are later abused by cybercriminals \u2013 for instance, to enable unsolicited access to private data.<\/p>\n<p>The real news here is use of this practice by a service provider, which is an extremely debatable approach. We doubt that the provider designed this action plan with deliberate malice in mind, but nevertheless the users are still under the threat of having their data stolen.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">7 steps to avoid phishing attacks on your <a href=\"https:\/\/twitter.com\/hashtag\/Facebook?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Facebook<\/a> <a href=\"https:\/\/t.co\/iZx5uBNxxI\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/iZx5uBNxxI<\/a> <a href=\"http:\/\/t.co\/998A40iCnN\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/998A40iCnN<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/584015066648813568?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 3, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Similarly to all traditional phishing cases, there is one efficient cure: <a href=\"https:\/\/www.kaspersky.com\/blog\/avoid-phishing-facebook\/7344\/\" target=\"_blank\" rel=\"noopener nofollow\">precaution and vigilance<\/a>. We would advise, as always, to pay attention to the actual web site URL and never enter your user credentials if the URL is different from the address you expected. Also note that all social network websites and online banking services have already migrated to the more secure HTTPS protocol which encrypts the communication, so we would strongly recommend you not enter any passwords on a page which does not have a little padlock sign in the header.<\/p>\n<p>We should note here that the latest <a href=\"https:\/\/www.kaspersky.com\/advert\/free-trials\/multi-device-security?redef=1&amp;THRU&amp;reseller=blog_en-global\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a> is capable of detecting insecure WiFi networks and warning a user against connecting to such hotspots.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An annoying story of &#8216;free&#8217; WiFi hotspots by St. Petersburg-based Smart WiFi. Nothing is for free, though, as you end up paying with your vk.com credentials<\/p>\n","protected":false},"author":421,"featured_media":8282,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[423,363,76,43,97,689,84],"class_list":{"0":"post-8279","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-mobile-devices","9":"tag-personal-data","10":"tag-phishing","11":"tag-privacy","12":"tag-security-2","13":"tag-vkontakte","14":"tag-wifi"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/smart-wifi-vkontakte-credentials\/8279\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/smart-wifi-vkontakte-credentials\/5770\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/smart-wifi-vkontakte-credentials\/5877\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/smart-wifi-vkontakte-credentials\/7459\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/smart-wifi-vkontakte-credentials\/7354\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/smart-wifi-vkontakte-credentials\/7459\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/smart-wifi-vkontakte-credentials\/8279\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/smart-wifi-vkontakte-credentials\/8279\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/mobile-devices\/","name":"mobile devices"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/8279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=8279"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/8279\/revisions"}],"predecessor-version":[{"id":33501,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/8279\/revisions\/33501"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/8282"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=8279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=8279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=8279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}