Widespread flaws in Wi-Fi Security: New set of vulnerabilities may expose data of millions
We are no strangers to the vulnerabilities of Wi-Fi and overall networking infrastructure. We can see safe browsing signs everywhere in decent public Wi-Fi hotspots. But when it's personal, is there any matter of concern? If you’re careful then mostly no! Even then sometimes an interested third party wants one simple loophole to get into your system. So even without being unsecure, there is a chance. And a recent discovery proved it once again. The latest finding tells us, maybe millions are compromised by an embedded flaw in the Wi-Fi security system and it is ongoing for the past two decades.
This time around vulnerabilities was found via smart home devices connected with Wi-Fi. Smart devices work with a control system, sometimes they are automated and most of the time it requires some type of command from the user to function. Hackers exploited the same mechanism but instead of connecting, they are mining sensitive information. When a device tries to connect with a network, it sends packets of data to verify the host. The host receives a request and accepts the prompt. Data gets intercepted between the two network devices.
The same procedure went down but with a slight twist. Hackers are using it to gain control over smart devices and steal vulnerable data. Belgian Mathy Vanhoef is a renowned IT researcher and specialist who studies CSP (Cybersecurity & Privacy). It was him who first glimpsed at this specific vulnerability related to Wi-Fi security. His discovery was named KRACK. It is short for Key Reinstallation Attack. KRACK is discovered while Vanhoef was going through wi-fi vulnerabilities and it became a priority. KRACK can easily bypass security and help attackers steal data, private chats, login credentials and even credit card information. And the user would have nothing to do with it as they will have no idea what’s going on. This attack stays like a leech and the hacker listens for device data as long as something interesting pops up.
According to a report covered by a IT publication these “Frag Attacks” currently is lacking sort of evidence to publish in diagrams. Wi-Fi Protected Access 3 (WPA3) and WPA2 both are vulnerable to KRACKs. Sending in ransomware, or malware can also be injected via an attack. Depending on the network configuration, much more can be done unless the user changes configuration. Usually updating drivers to the latest one can fix the problem on a network but most of the time it is not enough. MAC filtering is one of the effective solutions. Only filter the addresses specified by the user of all the device connected like smartphones and smart home devices.
Frag Attacks can come in the form of simple mail. The mail will be attached with an image file but it will just allocate space instead of showing the image. Once a user clicks on the file, their network route and directory IP’s will be sent back to a remote host or the attacker. At that session, every keystroke put on any login field can be tracked by a hacker. Which will later be used without the user’s concern. Attackers send mass files using the method. So, there are many vulnerabilities. It is why we can find many user information, location, IP, email, credit card information, emails and accounts with paid subscriptions sold on many third-party platforms and the dark web. We thought only WPA2 had this flaw in its system but turns out, WPA3 also has this security vulnerability. Many levels of security came with Wi-Fi protection. And Being the lasted one and vulnerable is a matter of concern. As technology is evolving, it’s getting easier to find loopholes. KRACK being a ranged attack, a small caution may go long way. It is to care for a connection that is close to the host and monitor what kind of data it requires to function.