Wi-Fi security has been breached, say researchers

Mave

TMS Founder
Administrator
Messages
234,547
Location
Belgium
Wi-Fi security has been breached, say researchers

D9sdJDo.png


At about 7AM ET this morning, researchers revealed details of a new exploit called KRACK that takes advantage of vulnerabilities in Wi-Fi security to let attackers eavesdrop on traffic between computers and wireless access points. The exploit, as first reported by Ars Technica, takes advantage of several key management vulnerabilities in the WPA2 security protocol, the popular authentication scheme used to protect personal and enterprise Wi-Fi networks. “If your device supports Wi-Fi, it is most likely affected,” say researchers.

So yeah, this is bad.

The United States Computer Emergency Readiness Team issued the following warning in response to the exploit:

US-CERT has become aware of several key management vulnerabilities in the 4-way handshake of the Wi-Fi Protected Access II (WPA2) security protocol. The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others. Note that as protocol-level issues, most or all correct implementations of the standard will be affected. The CERT/CC and the reporting researcher KU Leuven, will be publicly disclosing these vulnerabilities on 16 October 2017.

The researchers noted that 41 percent of all Android devices are vulnerable to an “exceptionally devastating” variant of the Wi-Fi attack. All Wi-Fi devices are to some degree susceptible to the vulnerabilities making them ripe for data theft or ransomware code injection from any malicious attacker within range.

Source and more: https://www.theverge.com/2017/10/16/16481136/wpa2-wi-fi-krack-vulnerability

Make sure to update all your devices guys.
 
Here's the link to the official site of the researcher: https://www.krackattacks.com/

It's bad.
Like, really, really bad.
Attackers still need to be physically in range of your network, but once they're in, they can read all traffic. They can also forge traffic, in some cases.

Encrypting traffic with HTTPS is still secure, but not all sites use HTTPS properly. The researcher demonstrates how he is able to easily (within 5 minutes) hack a network, put a sniffer in place, and decrypt the username and password of the HTTPS-secured site match.co.uk.

Luckily, the guy already notified the major fabricators back in May (that's also when he discovered it, it's only public now his paper is out), so hopefully they'll have patches ready soon.
 
Stybar said:
Here's the link to the official site of the researcher: https://www.krackattacks.com/

It's bad.
Like, really, really bad.
Attackers still need to be physically in range of your network, but once they're in, they can read all traffic. They can also forge traffic, in some cases.

Encrypting traffic with HTTPS is still secure, but not all sites use HTTPS properly. The researcher demonstrates how he is able to easily (within 5 minutes) hack a network, put a sniffer in place, and decrypt the username and password of the HTTPS-secured site match.co.uk.

Luckily, the guy already notified the major fabricators back in May (that's also when he discovered it, it's only public now his paper is out), so hopefully they'll have patches ready soon.

Good thing I bought a VPN earlier this week, everything I do is now encrypted.
 
Back
Top Bottom