Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Severe WiFi security flaw puts millions of devices at risk (WPA2 cracked, but there's a patch)
Engadget ^ | Oct 16, 2017 | Steve Dent

Posted on 10/16/2017 6:24:52 AM PDT by dayglored

"Krack Attack" allows hackers to steal credit cards, bank info and more.

Researchers have discovered a key flaw in the WPA2 WiFi encryption protocol that could allow hackers to intercept your credit card numbers, passwords, photos and other sensitive information. The flaws, dubbed "Key Reinstallation Attacks," or "Krack Attacks," are in the WiFi standard and not specific products. That means that just about every router, smartphone and PC out there could be impacted, though attacks against Linux and Android 6.0 or greater devices may be "particularly devastating," according to KU Leuven University's Mathy Vanhoef and Frank Piessens, who found the flaw.

Here's how it works. Attackers find a vulnerable WPA2 network, then make a carbon copy of it and impersonate the MAC address, then change the WiFi channel. This new, fake network acts as a "man in the middle," so when a device attempts to connect to the original network, it can be forced to bypass it and connect to the rogue one.

Normally, WPA2 encryption requires a unique key to encrypt each block of plain text. However, the hack described in the Krack Attack paper forces certain implementations of WPA2 to reuse the same key combination multiple times.

...

(Excerpt) Read more at engadget.com ...


TOPICS: Business/Economy; Computers/Internet; Hobbies
KEYWORDS: krack; krackattack; wifi; windowspinglist; wpa2
Navigation: use the links below to view more comments.
first previous 1-2021-4041-52 last
To: bitt; dayglored; miliantnutcase; Gideon7
if you have wi-fi enabled on your IPhone while you’re out and about, a hacker can grab your info?

Nope:

Apple has already patched the ‘KRACK’ WPA2 Wi-Fi security flaw iOS, macOS, watchOS, and tvOS betas
Monday, October 16, 2017 · 6:01 pm

“Apple has already patched the WPA2 Wi-Fi KRACK exploit announced today in iOS, macOS, watchOS, and tvOS betas, reports Rene Ritchie [via Twitter],” iClarified reports.

“Discovered by security researcher Mathy Vanhoef,” iClarified reports, “the method of using key reinstallation attacks (KRACKs) allow attackers to read information that was previously assumed to be safely encrypted and steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on.”

iClarified reports, “You can learn more about the KRACK exploit by clicking here.”

Full article here.

MacDailyNews Take: This is mainly an Android problem because Android is a stolen product that was initially supposed to be a BlackBerry knockoff which, after Steve Jobs revealed the iPhone, was hastily cobbled-together to mimic Apple’s revolutionary and patented Multi-Touch™ device. This hasty corner-cutting resulted in something that was and remains so poorly implemented that even the simple act of delivering software updates is in many cases never achieved leaving those who ignorantly settle for Android dreck vulnerable to myriad and unending security lapses and privacy intrusions.


41 posted on 10/16/2017 5:37:44 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Swordmaker

thanks!!!!!!!!!!


42 posted on 10/16/2017 6:15:50 PM PDT by bitt (The press takes him literally, but not seriously; his supporters take him seriously, but not literal)
[ Post Reply | Private Reply | To 41 | View Replies]

To: Gideon7
A WPA2 WiFi access point can be configured with a hidden SSID instead of a public one to make it harder to hijack.

That's what I've always done. If you don't advertise it, most people can't find your network unless you tell them the ID. When guests ask to use my network, I give them a guest SSID and password. If they want to easily get on a network, some neighbors networks are not secured (which I would never use).

43 posted on 10/16/2017 6:29:33 PM PDT by roadcat
[ Post Reply | Private Reply | To 11 | View Replies]

To: Swordmaker

Thanks bro.


44 posted on 10/16/2017 6:31:10 PM PDT by Mark17 (Genesis chapter 1 verse 1. In the beginning GOD....And the rest, as they say, is HIS-story)
[ Post Reply | Private Reply | To 41 | View Replies]

To: Swordmaker
Since you do not access it often, it can be really complex, and can include special characters and both upper and lower case alphabetic characters as well as numbers and symbols.

And by all means, write it down and save it in a secure location! There are times when one day I wake up and for the life of me I can't remember the exact password, despite having used it for many months. Getting senile I guess. Now I make sure the tips I leave for myself are easily translated to my passwords (with the many special mix of characters and symbols). I still don't write down the exact string of characters, just tips to translate, even though secured in safes - I'm a security freak.

45 posted on 10/16/2017 6:38:24 PM PDT by roadcat
[ Post Reply | Private Reply | To 40 | View Replies]

To: bigbob
Don’t we all have our SSIDs set to “Free Republic” or “Pig in a Pantsuit” or such?

Mine's "TrumpIsPrezBitchez"

46 posted on 10/16/2017 7:04:15 PM PDT by usconservative (When The Ballot Box No Longer Counts, The Ammunition Box Does. (What's In Your Ammo Box?))
[ Post Reply | Private Reply | To 18 | View Replies]

To: Swordmaker
> MacDailyNews Take: This is mainly an Android problem because Android is a stolen product that was initially supposed to be a BlackBerry knockoff which, after Steve Jobs revealed the iPhone, was hastily cobbled-together to mimic Apple’s revolutionary and patented Multi-Touch™ device. This hasty corner-cutting resulted in something that was and remains so poorly implemented that even the simple act of delivering software updates is in many cases never achieved leaving those who ignorantly settle for Android dreck vulnerable to myriad and unending security lapses and privacy intrusions.

Wow.

Well, tell MacDailyNews that for me, it's an Apple problem, because my wonderful, dependable, functional, reliable, incredibly useful, need-it-every-day Apple iPhone 5c likely won't get the iOS patch necessary to address this vulnerability, because it just went out of security update support.

I don't want a new phone. My phone works just fine, and shows every indication of continuing to work fine for years to come.

Except that it's now out of support, and I can't get a patch for this security issue.

So, no, MacDailyNews, this is not just an Android problem, at least not for me.

47 posted on 10/16/2017 8:46:32 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 41 | View Replies]

To: Swordmaker
> My take away from this is to have a very hard WIFI password. Since you do not access it often, it can be really complex, and can include special characters and both upper and lower case alphabetic characters as well as numbers and symbols. Don’t use anything that’s in a dictionary. By doing this, you can create a password that would take geological ages to crack by brute force. So regardless if a malicious actor can clone your WPA2 protected Router, he still has to hack your passwords by brute force, trying every possible password until he hits the right one. . .

That's fine ... but my home is in a remote rural area, in a clearing a half-mile from anywhere somebody could set up without being seen from the house. I don't even bother with WPA2 at home. :-)

At work it's a very different story, of course. Your good advice applies there quite nicely.

48 posted on 10/16/2017 8:55:02 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 40 | View Replies]

To: bigbob

Mine is “FBI”

:-D


49 posted on 10/16/2017 10:13:30 PM PDT by Bikkuri
[ Post Reply | Private Reply | To 18 | View Replies]

To: Swordmaker
My take away from this is to have a very hard WIFI password.

From the original Krackattacks article:

Should I change my Wi-Fi password?

Changing the password of your Wi-Fi network does not prevent (or mitigate) the attack.

original article

50 posted on 10/16/2017 10:41:47 PM PDT by Oshkalaboomboom
[ Post Reply | Private Reply | To 40 | View Replies]

To: Oshkalaboomboom
Changing the password of your Wi-Fi network does not prevent (or mitigate) the attack.

The original paper states the hack requires the passwords to be cracked by brute force. . . and the authors assume that will be easily done. It doesn't necessarily mean it will be done in a short time. The more complex the password, the longer brute force cracking will take.

As I understand it, the cloning of the Router does not copy the settings or any data on the original WIFI Router such as the contents of the password files. The cloning merely replicates the MAC addressing. . . and inserts itself in place of the original Router. it's the WIFI packet encryption keys that are being forced to be reused multiple times by the hack when normally they are supposed to be replaced with each packet, not the WIFI passwords themselves.

51 posted on 10/17/2017 12:47:27 AM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 50 | View Replies]

To: dayglored
Well, tell MacDailyNews that for me, it's an Apple problem, because my wonderful, dependable, functional, reliable, incredibly useful, need-it-every-day Apple iPhone 5c likely won't get the iOS patch necessary to address this vulnerability, because it just went out of security update support.

I think this is a problem that really won't rear its head much. . . but you are absolutely right. On the other hand, there are a lot of devices out there that are in the same boat of vulnerability and the real solution is to upgrade the firmware on the routers. Unfortunately, that's about as likely to happen as older Android phones getting a security upgrade.

Got any ideas?

52 posted on 10/17/2017 12:57:15 AM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 47 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-52 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson