Wi fi security may be cracked, and it’s an extremely, very bad thing

Wi-Fi security may be cracked, and it's a very, very bad thing

Wi-Fi, the wireless data transfer technology virtually all of us use on a daily basis, is in difficulty.  

The WPA2 security process, a widespread standard for Wi fi security that’s used on nearly every Wi fi router, has apparently been damaged.  

The details on the security take advantage of, which is called KRACK, or Key Reinstallation Attacks, are to be released at 8am ET Monday on the site www.krackattacks.com.

But according to a new advisory by US-CERT, via Ars Technica, there are “several key management vulnerabilities” in WPA2, allowing for “decryption, packet replay, TCP connection hijacking, HTTP content shot. ” The worst part? They are “protocol-level issues, ” meaning that “most or all correct implementations from the standard will be affected. “

We’ll know more when the details about KRACK are usually released, but if it turns out that one may use this exploit in a fairly simple plus reliable way, then this is one of the greatest online security threats ever.  

To see why, one has to go somewhat bit back into the past. Wi-Fi was previously secured with a standard called WEP, which was found to be vulnerable to several attacks, many of which don’t require the particular attacker to have physical access to the particular Wi-Fi equipment or even be connected towards the network. Over time, tools that make these types of attacks simple have been developed, and today, if your Wi-Fi is protected simply by WEP, there’s a choice of simple cellular and desktop apps that break your password in seconds (no matter how long or complicated this is).  

Because of these problems, WEP was mostly replaced along with WPA and, later, WPA2, that are far more secure. Though there were methods to crack a WPA2-protected Wi-Fi router, if your password was long plus complicated enough, it made it a great deal harder or nearly impossible to do.  

(For completeness’ sake, one hacking tool, called Reaver, can break WPA2-protected routers no matter the security password, but it’s fairly simple to protect your own router â€? you simply have to switch off a feature called WPS. )

If this latest vulnerability is similar to the way in which WEP is vulnerable â€? plus it looks like it is at the moment â€? it won’t matter how strong the password you chose. This would create hundreds of millions of routers out there, utilized by individuals and businesses alike, available to hackers. It would mean that, if you worry about security, you should not use Wi-Fi whatsoever until this is fixed. At the very least, you need to use HTTPS connections whenever possible, and a great VPN might add another level of security.

And treatments for these types of things don’t arrive easy. Some routers will probably obtain a firmware update, but a lot of home customers might not know how to apply it, or remember that this is a threat. Again, going back towards the time when WEP was damaged in 2001, it took yrs for ISPs to start shipping routers with WPA and WPA2 allowed as default, leaving many clients wide open to attacks.  

We’ll know more after the announcement today; stay tuned for more for updates.  



Please enter your comment!
Please enter your name here