Program



Track D(Hall D)
2025.8.27 16:20 ~ 17:00
mail share facebook share twitter share linkedin share band share kakao
Stealthy Intruders Targeting Internal Networks : Techniques and Recent Case Studies of Wireless Backdoor Hacking

GITSN

Han Dong Jin, CEO


Attackers no longer blindly attempt to breach external perimeters. The nature of cyberattacks is
becoming increasingly sophisticated, and one threat that has recently begun to draw attention from
both corporations and government agencies is wireless backdoor hacking.
Wireless backdoor hacking has evolved from early techniques involving disguised USB devices such as
keyboards to advanced methods that embed wireless modules during the supply chain stage of servers
and network equipment. Recently, such intrusions have extended to non-network industrial
equipment, including cranes and photovoltaic inverters. These techniques enable unauthorized access
through radio frequency communication, even within internal networks assumed to be isolated from
external connectivity. Because they can evade traditional security systems such as WIPS, which
typically block only Wi-Fi traffic, these threats may persist undetected for extended periods. If followed
by and APT-level attack, the resulting impact can be critical.
This lecture will examine the technological evolution of wireless backdoor hacking and actual
infiltration methods, supported by documented case studies. Furthermore, we propose actionable
strategies that CISOs and cybersecurity professionals should be aware of in order to enhance the
resilience of network environments.