Understanding the KRACK Wi-Fi Hack
What should I be doing to protect myself from the new Wi-Fi hacking problem?
This question was answered on October 19, 2017.
Wireless Internet access has always been more vulnerable to unauthorized access than a wired connection because it’s a broadcast technology.
It’s essentially broadcasting a signal which only requires that a person with ill intent be in proximity of your signal.
To combat unauthorized users from accessing our private airwaves, we have had various protection protocols to choose from when we setup our routers: WEP, WPA and WPA2.
WEP or Wired Equivalent Privacy was the first way of encrypting our wireless transmissions, but proved to be hackable as security flaws were discovered. Luckily, a more difficult to hack encryption was available (WPA – Wi-Fi Protected Access) when the major WEP security flaws were discovered.
As time went on, WPA became vulnerable through security flaws, but we could turn to WPA2, which is what most of us use today.
The KRACK Problem
Although WPA2 wasn’t technically “un-hackable”, it would take enough effort and time that it made random acts of hacking undesirable.
What was recently discovered by a security researcher in Belgium was a flaw that allowed this highest level of security to be compromised fairly easily.
Codenamed KRACK (Key Reinstallation Attack), actually exploited the protocol in a completely different way: it didn’t target the Wi-Fi access point, but the various devices that connect to it instead.
The website that explained this proof-of-concept compromise said that virtually every device that has Wi-Fi capabilities was potentially at risk and could become a victim of everything from stolen usernames and passwords to injecting ransomware into websites.
The Good News
As scary as this sounds, there are a few hurdles that will make this exploit more difficult to pull off.
First off, the hacker would need to be near enough to you to access your Wi-Fi signal, so it eliminates the remote hacking options that the skilled underworld prefers.
This exploit primarily takes advantage of interactions with unsecured sites (http://), so whenever you see https:// in the website you’re accessing or you use a secured app on your phone, there is yet another layer of security that they would have to break.
Most of today’s browsers automatically attempt to connect via https:// when it’s available, but if you want to play it safe, you can add a browser plug in called HTTP Everywhere (https://goo.gl/4TKCnB).
The security researcher also notified companies ahead of the public announcement, so updates from Microsoft and Apple have already created updates for the exploit.
Until a new security protocol is created, WPA2 is the best we have, so continue to use it but make sure you update every device that you use for sensitive transmissions on Wi-Fi as soon as patches are made available.
A comprehensive list of technology vendors along with any information about known updates is available at: https://goo.gl/iJhJih (this is a dynamic list, so revisit it often) or check directly with your device vendor.
The Bad News
Some devices may not ever get a patch, especially older or embedded devices that have no option for updating. With the growing popularity of smart devices in the home, adding new security devices makes sense, which I’ll explain next week.
Need Help with this Issue?
We help people with technology! It's what we do.
Schedule an Appointment with a location for help!
Posted by Ken of Data Doctors on October 19, 2017