An hacking activity usually deal with the unauthorized access to ones system.
Similarly this technique of Drive by hacking by which the attacker release wireless networks. Then a computer user of an organization finding a wireless network tries to connect to the open network and it is this process when the computer or system user falls easy prey to the hacker. The attacker uses the wireless network as a medium to intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
It is often accompanied with the SqL injection packets into the network.
This attack is also popular by the name hotspot attack.