|
As a proof-of-concept researchers executed a key reinstallation attack against an Android smartphone demostrating how the attacker is able to decrypt all data that the victim transmits.
Security researchers Mathy Vanhoef and Frank Piessens have detected a major vulnerability in the WPA2 protocol that secures all protected Wi-Fi networks. Details of the exploit named KRACK were published today depicting how the weakness can be exploited by attackers to steal sensitive information like passwords or credit card numbers. “We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks,” writes Vanhoef. He adds:
— “An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. The attack works against all modern protected Wi-Fi networks. Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites. The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. ... Note that if your device supports Wi-Fi, it is most likely affected.”
— But don’t panic, says Steven Bellovin: “Encryption flaws are sexy and get academics very excited, but they’re rarely particularly serious for most people. That’s very true here. In fact, at a guess, the most widespread problem, with WiFi, will have fewer serious consequences than the RSA problem.”
— Further insight from Brian Krebs: “As scary as this attack sounds, there are several mitigating factors at work here. First off, this is not an attack that can be pulled off remotely: An attacker would have to be within range of the wireless signal between your device and a nearby wireless access point.”
Sponsored byRadix
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byVerisign