Latest Update on KRACK (Key Reinstallation Attack): the flaw in WPA2 protocal for WIFI systems

Belgian researchers, Mathy Vanhoef and Frank Piessens — who recently issued warnings concerning a bug in the WPA2 protocol, a widely used system for securing Wi-Fi communications — have made tools available to “detect whether an implementaiton of the 4-way handshake… is vulnerable to key reinstallation attacks.” Standard protocols, such as “changing the password” will not mitigate this vulnerability.

 

 

The researcheres emphasized: “luckily implementations can be patched in a backwards-compatible manner. This means a patched client can still communicate with an unpatched access point (AP), and vice versa. In other words, a patched client or access point sends exactly the same handshake messages as before, and at exactly the same moment in time. However, the security updates will assure a key is only installed once, preventing our attack. So again, update all your devices once security updates are available. Finally, although an unpatched client can still connect to a patched AP, and vice versa, both the client and AP must be patched to defend against all attacks!”

 

 

After the discovery of KRACK, the name given to the flaw in the system, the U.S. Department of Homeland Security Computer Emergency Response Team announced that the WPA2 protocol could be used to obtain personal information and read private communications over secure Wi-Fi. [See video below.]

Pre-shared password exploit

The problem with the system arose due to the protocol’s ability to connect devices with a pre-shared password. Vanhoef and Piessens explained that KRACK (Key Reinstallation Attack) “abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key.” These “Wi-Fi handshakes” are used to generate session keys, which had previously remained secure. However, attackers are now able to grant access by connecting new devices to the in-use key, which is accomplished by manipulating the system and replaying handshake messages.


Cryptography teacher Matthew Green of Johns Hopkins University stated that the flaw would likely result into “a slew of TJ Maxxes.” This was, of course, referring to a 2007 cyberattack that granted hackers access to network-connected cash registers.

Vanhoef and Piessens warned that the majority of Wi-Fi users are now vulnerable to hacking attempts due to the bug. “If your device supports Wi-Fi, it is most likely affected.” Furthermore, they stated that the attack has been shown to “occur spontaneously if certain handshake messages are lost due to background noise.” Additional information pertaining to the flaw can be found on their website www.krackattacks.com.

 

 

On a positive note, companies like Symantec and Microsoft have offered users protection against these attacks. Norton is offering services to encrypt traffic and protect connected devices from hacking and identity theft. Microsoft Corporation has also released a security update for Windows, stating that users who update their systems either manually or through automatic updates will remain protected. Additionally, sites and services providing content over strict HTTPS will encrypt traffic from the browser to the server, allowing continued access without the risk of attack.

Did you miss this?

Other Popular Stories

  • Bid deadline today for Canada's new search and rescue aircraft
  • Honda hopes to catch up on Autonomous driving and electric vehicle technology — by 2025
  • March wholesale, retail sales lower in most sectors: Statistics Canada
  • Federal government must help Ontario close widening "skills gap" through immigration reforms
  • Canadian Solar to supply solar mega-projects in Ontario and Turkey
  • Tesla wall-mounted battery will power the whole household
  • Five Seasons Ventures Invests in European Food and AgriTech
  • Unusual hydrogen car could soon be built in UK
  • Australian researchers claim new efficiency record for solar cells
  • Record car sales reported in Canada, US for October
  • Industry-academic R&D cooperation to boost Ontario's aerospace sector
  • Ontario increases incentives for EV buyers
  • LNG activity heating up in BC as Petronas seeks export licence
  • Commodities firm sues Shell, BP, Statoil for price fixing
  • Automation-proof jobs, and jobs that will eventually be automated
  • General Dynamic Land Systems $15-billion deal with Saudis at risk over Kingdom's alleged involvement in murder plot
  • Ford GT supercar in production at Markham's Multimatic plant
  • Canada's west to lead growth of economy for 2017 at 3.3 per cent: Conference Board of Canada
  • Bombardier flies new CSeries jet for first time
  • MRO contract of $423 million for Canada's CC-130 Hercules fleet
Scroll to Top