Latest Update on KRACK (Key Reinstallation Attack): the flaw in WPA2 protocal for WIFI systems

Belgian researchers, Mathy Vanhoef and Frank Piessens — who recently issued warnings concerning a bug in the WPA2 protocol, a widely used system for securing Wi-Fi communications — have made tools available to “detect whether an implementaiton of the 4-way handshake… is vulnerable to key reinstallation attacks.” Standard protocols, such as “changing the password” will not mitigate this vulnerability.

 

Engineered Design Insider Cracker hacker using WPa2 Vulnerability hotspotsOil Gas Automotive Aerospace Industry Magazine

 

The researcheres emphasized: “luckily implementations can be patched in a backwards-compatible manner. This means a patched client can still communicate with an unpatched access point (AP), and vice versa. In other words, a patched client or access point sends exactly the same handshake messages as before, and at exactly the same moment in time. However, the security updates will assure a key is only installed once, preventing our attack. So again, update all your devices once security updates are available. Finally, although an unpatched client can still connect to a patched AP, and vice versa, both the client and AP must be patched to defend against all attacks!”

 

Engineered Design Insider hacker at workOil Gas Automotive Aerospace Industry Magazine

 

After the discovery of KRACK, the name given to the flaw in the system, the U.S. Department of Homeland Security Computer Emergency Response Team announced that the WPA2 protocol could be used to obtain personal information and read private communications over secure Wi-Fi. [See video below.]

Pre-shared password exploit

The problem with the system arose due to the protocol’s ability to connect devices with a pre-shared password. Vanhoef and Piessens explained that KRACK (Key Reinstallation Attack) “abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key.” These “Wi-Fi handshakes” are used to generate session keys, which had previously remained secure. However, attackers are now able to grant access by connecting new devices to the in-use key, which is accomplished by manipulating the system and replaying handshake messages.


Cryptography teacher Matthew Green of Johns Hopkins University stated that the flaw would likely result into “a slew of TJ Maxxes.” This was, of course, referring to a 2007 cyberattack that granted hackers access to network-connected cash registers.

Vanhoef and Piessens warned that the majority of Wi-Fi users are now vulnerable to hacking attempts due to the bug. “If your device supports Wi-Fi, it is most likely affected.” Furthermore, they stated that the attack has been shown to “occur spontaneously if certain handshake messages are lost due to background noise.” Additional information pertaining to the flaw can be found on their website www.krackattacks.com.

 

Engineered Design Insider Kracker hacker using KRACK vulnerability hotpspotsOil Gas Automotive Aerospace Industry Magazine

 

On a positive note, companies like Symantec and Microsoft have offered users protection against these attacks. Norton is offering services to encrypt traffic and protect connected devices from hacking and identity theft. Microsoft Corporation has also released a security update for Windows, stating that users who update their systems either manually or through automatic updates will remain protected. Additionally, sites and services providing content over strict HTTPS will encrypt traffic from the browser to the server, allowing continued access without the risk of attack.

Did you miss this?

Other Popular Stories

  • Andritz to manufacture stator coils for NA hydropower market in Peterborough
  • Alphabet's Chairman praises Toronto technology as Google's Sidewalk Labs announces living "technology lab" for Toronto Portlands
  • Ford announces Edge production will remain in Oakville
  • $3.4 Million Invested in Hypercar with Sharper, Faster Turns
  • Has the time come for irradiated beef in Canada?
  • Are we ready to let go of the wheel? The current state of self-driving car technology.
  • Large investment in Toronto biotech company could lead to new therapies for heart patients
  • More warnings that Canada could miss the LNG boat
  • Richard Browning invents super human 450 km per hour “Iron Man” flight suit (video)
  • Trucking industry moving toward use of EOBRs
  • Volvo will use DME to fuel heavy-duty trucks in North America
  • Large CSeries order builds momentum for Bombardier
  • Fiat Chrysler denies wrongdoing as EPA accuses it of emissions cheating
  • Drop in manufacturing pushes industrial capacity use down in Q4 2012
  • Deep Roads — researchers propose taking road expansion underground to reduce congestion and pollution
  • Wind energy on growth trend, major offshore project proposed for Nova Scotia
  • $25.8 million Low Carbon Innovation Fund aims to help commercialize technologies that reduce greenhouse emissions.
  • Ford investment in Oakville gets auto industry "on the move again"
  • Steel industry welcomes anti-dumping investigation by federal government
  • Offshore wind costs will fall significantly if development continues: study
Scroll to Top