Latest Update on KRACK (Key Reinstallation Attack): the flaw in WPA2 protocal for WIFI systems

Belgian researchers, Mathy Vanhoef and Frank Piessens — who recently issued warnings concerning a bug in the WPA2 protocol, a widely used system for securing Wi-Fi communications — have made tools available to “detect whether an implementaiton of the 4-way handshake… is vulnerable to key reinstallation attacks.” Standard protocols, such as “changing the password” will not mitigate this vulnerability.

 

 

The researcheres emphasized: “luckily implementations can be patched in a backwards-compatible manner. This means a patched client can still communicate with an unpatched access point (AP), and vice versa. In other words, a patched client or access point sends exactly the same handshake messages as before, and at exactly the same moment in time. However, the security updates will assure a key is only installed once, preventing our attack. So again, update all your devices once security updates are available. Finally, although an unpatched client can still connect to a patched AP, and vice versa, both the client and AP must be patched to defend against all attacks!”

 

 

After the discovery of KRACK, the name given to the flaw in the system, the U.S. Department of Homeland Security Computer Emergency Response Team announced that the WPA2 protocol could be used to obtain personal information and read private communications over secure Wi-Fi. [See video below.]

Pre-shared password exploit

The problem with the system arose due to the protocol’s ability to connect devices with a pre-shared password. Vanhoef and Piessens explained that KRACK (Key Reinstallation Attack) “abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key.” These “Wi-Fi handshakes” are used to generate session keys, which had previously remained secure. However, attackers are now able to grant access by connecting new devices to the in-use key, which is accomplished by manipulating the system and replaying handshake messages.


Cryptography teacher Matthew Green of Johns Hopkins University stated that the flaw would likely result into “a slew of TJ Maxxes.” This was, of course, referring to a 2007 cyberattack that granted hackers access to network-connected cash registers.

Vanhoef and Piessens warned that the majority of Wi-Fi users are now vulnerable to hacking attempts due to the bug. “If your device supports Wi-Fi, it is most likely affected.” Furthermore, they stated that the attack has been shown to “occur spontaneously if certain handshake messages are lost due to background noise.” Additional information pertaining to the flaw can be found on their website www.krackattacks.com.

 

 

On a positive note, companies like Symantec and Microsoft have offered users protection against these attacks. Norton is offering services to encrypt traffic and protect connected devices from hacking and identity theft. Microsoft Corporation has also released a security update for Windows, stating that users who update their systems either manually or through automatic updates will remain protected. Additionally, sites and services providing content over strict HTTPS will encrypt traffic from the browser to the server, allowing continued access without the risk of attack.

Did you miss this?

Other Popular Stories

  • GE expanding cold-weather jet engine facility in Winnipeg
  • Google's self-driving cars revealed to media for first time
  • Wind projects going ahead in Quebec, public not necessarily on board
  • Labour groups welcome interim report on precarious workers in Ontario
  • Canada's auto industry on cusp of rebuilding in NAFTA, but no thanks to CETA: Unifor
  • Small business tax rate cut to 3.5 percent will only partially mitigate impact of minimum wage increases, both set for January 1 in Ontario
  • Canada's west to lead growth of economy for 2017 at 3.3 per cent: Conference Board of Canada
  • Industry mostly positive about government's infrastructure spending plans
  • Bombardier upbeat about growth prospects now that CSeries jets are flying
  • Canada-US trade as it should be, but diversification desirable: report
  • Jobs that are at risk of automation — and jobs that are not
  • Driverless transport systems "TecLines" will allow Mercedes factory to customize assembly
  • GPS III set to launch December 18: U.S. Air Force to launch via Space X Falcon 9 paylod; will be harder to jam, more secure and accurate
  • SpaceX-1 Launches Falcon 9
  • Petronas deal could get LNG moving in Canada
  • Saudi solar-powered desalination plant will be world's largest
  • May manufacturing sales higher on petroleum, cars
  • Wind more economical than nuclear: offshore wind turbines in U.K. significantly less expensive per megawatt than planned nuclear
  • Porter Airlines seeks to extend island airport runway for jets
  • Delorean coming “Back to the Future” soon to return to our streets?
Scroll to Top