Thursday, 2 November 2017

More on KRACKS, the WiFi WPA2 attack technique reads info that was previously assumed to be safely encrypted.

The recent discovery of serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks, has been in the headlines. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks otherwise known as KRACKs. 

Concretely, any attacker can use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. 

The attack works against all modern protected Wi-Fi networks

Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites.

The weaknesses are to be found in the IEEE 802.11 Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must urgently update their affected products as soon as security updates become available. If ANY of your devices support Wi-Fi, it is most likely affected

During initial research, it was discovered that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and many others, are all affected by some variant of the attacks. 

For more information about specific products, consult the database of CERT/CC, or contact your vendor.

The research behind the attack will soon be presented at the upcoming Computer and Communications Security (CCS) conference, and at the Black Hat Europe conference. 

A very detailed research paper can already be downloaded. The recommendation from MenteSanas is not to delay acting on this risk any further. 

No comments:

Post a Comment

Contact us any day at 10am EST here where we discuss the infrastructure required in Smart Cities and IoT in 2019