WPA2 Krack attack blows Wi-Fi security wide open: Fundamental crypto crapto

Image iStock

Security researchers have discovered a Wi-Fi network vulnerability that could allow attackers to steal sensitive information or spread malicious software while someone is logged into a computer or mobile device.

'WPA2 is now the recommended option for securing your WI-FI network; the flaw, if successful, and if you're not using any other advance features ( VPN, encrypted data etc) could enable a hacker to eavesdrop on your data and or possibly gain access to any unsecured shares available on the same network, ' says Mark James, Security Specialist at ESET. The same is true of other Linux implementations that use version 2.4 and 2.5 of wpa_supplicant, the Wi-Fi client commonly used on Linux (wpa_supplicant's most recent version is 2.6).

A new vulnerability in the Wi-Fi Protected Access II (WPA2) protocol has been detailed. The researcher said they didn't know whether the vulnerability has been exploited by real-world attackers yet - but now it has been made public, the chances of it happening seem likely to increase.

"The attack works against all modern protected Wi-Fi networks", the researcher noted.

Previous research by Vanhoef in related areas of HTTPS and Wi-Fi security can be found here and here. You should also consider using Virtual Private Networks (VPN) to obfuscate your internet usage, especially if you keep using Wi-Fi, and especially in those places where you don't control the wireless network.

If you utilize a Wi-Fi network, you are vulnerable to being hacked even when utilizing passwords and encryption, according to researchers in the United Kingdom.

To prevent the attack, users must update affected products as soon as security updates become available.

The flaw affects to protocol itself, not any specific device or software, so it's possible to have the correct implementations and still be adversely affected.

Seahawks in LA looking for first road win of season
Los Angeles have scored 142 points in the first four games which is incredible from a team that was struggling so much past year . The lowest record a year ago for the wildcard slots was 9-7 and was enough to snatch Detroit a playoff slot against the Seahawks.

This also allows the decryption of TCP SYN packets, which can then be used to hijack TCP connections and perform HTTP injection attacks such as infecting the target with malware.

The issue stems from WPA2, a protocol that secures wireless networks.

News of the week - and it's still only Monday - is a Bug With An Impressive name (and its own logo!) called the KRACK Attack.

"Additionally, it's likely that you don't have too many protocols relying on WPA2 security". The wpa_supplicant is the WiFi client commonly used on Linux and Android (6.0 and above). Therefore, the third step of the four-way handshake-in which the encryption key is negotiated-may be rebroadcast to the client if the access point has not received an acknowledgement.

Mikrotik: The vendor has already released patches which fix the vulnerablities.

"We will be patching any affected devices in the coming weeks", the company said in a statement.

Changing the password won't do any good, the devices themselves need to be updated, so if you are using old technology you may be out of luck. However, insecure connections to websites, such as those that do not display a padlock in the address bar indicating support for HTTPS, leave your data vulnerable.

If it's possible, connect your computer directly to the router with an ethernet cable and install any updates that the router may require. In other words, a hacker would have to be physically near the same router as you to gain access to your device.



Other news