Connect with us


NEWS

Android phones are Vulnerable to the WPA2 “KRACK Attack” Threatening Wi-Fi users

Published

on

You might have heard or read about WPA2 (WiFi Protected Access II).

I mentioned something about it here.

It is the most common and secure wireless encryption protocol that you’ll find in use on networks such as home, public cafes, etc. Needless to say, it is a widespread standard for Wi-Fi security that’s used on nearly every Wi-Fi router,

The WPA2 security protocol, however, has apparently been cracked.

A new exploit can allow attackers to read Wi-Fi traffic between devices and wireless access points, and even modify it to inject malware into websites. Researchers have started disclosing security vulnerabilities today, and it looks like Android and Linux-based devices are the worst affected. Researchers claim the attack works against all modern Wi-Fi networks using WPA or WPA 2 encryption, and that the weakness is in the Wi-Fi standard itself so it affects macOS, Windows, iOS, Android, and Linux devices.

Intercepting traffic lets attackers read information that was previously assumed to be safely encrypted, and hackers don’t need to even crack a Wi-Fi password to achieve this. The vulnerability requires that a device be in range to a malicious attacker, and it can be used to steal credit card numbers, passwords, chat messages, photos, emails, and lots of other online communications.

[youtube https://www.youtube.com/watch?v=Oh4WURZoR98?rel=0&]

Android 6.0 and above contains a vulnerability that researchers claim “makes it trivial to intercept and manipulate traffic sent by these Linux and Android devices.” 41 percent of Android devices are vulnerable to an “exceptionally devastating” variant of the Wi-Fi attack that involves manipulating traffic. Attackers might be able to inject ransomware or malware into websites thanks to the attack, and Android devices will require security patches to protect against this. Although most devices appear to be vulnerable to attacks reading Wi-Fi traffic, the exploit doesn’t target access points. The attack exploits vulnerabilities in the 4-way handshake of the WPA2 protocol, a security handshake that ensures client and access points have the same password when joining a Wi-Fi network.

As this is a client-based attack, we should expect to see a number of patches for devices in the coming weeks. However, It’s not likely for most affected WiFi routers and access points to receive patches immediately, and we can only pray for the older ones. However, it might not be the case that the attackers are actively exploiting the vulnerabilities in the wild. You can take care of a few things as a protective measure:

  • Prefer HTTPS over HTTP.
  • Don’t provide confidential details over unencrypted connections as they’re sent in plain text.
  • Use VPN services to add an extra layer of security.
  • Don’t use public WiFi networks unless it’s necessary.
  • Prevent yourself from visiting unknown websites or installing software from untrusted sources.

Researchers sent out notifications to specific vendors in July, and a broad notification was distributed in late August. Security researchers note that changing your Wi-Fi password won’t help prevent attacks, but that it’s worth updating router firmware and all client devices to the latest security fixes. “It might be that your router does not require security updates,” say researchers, but it’s worth checking with your router vendor to make sure.

Nigeria’s top youth newspaper - actively working to deliver credible news, entertainment, and empowerment to 50 million young Africans daily.

Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Trending