The WPA2 Security Used to Protect Your Wi-fi Has Been Hacked
As digital accountants, data security is of paramount importance to us and our clients. To this end we are always researching the latest security issues that the industry faces to ensure we are prepared to face them, and our data is kept secure.
Recently news has come in regarding a WPA2 exploit that allows unauthorised hackers to access protected data sent via wi-fi. WPA2 is very commonly used, and is the de-facto standard for almost all home and small business Wi-Fi communications.
What is WPA2. Can I just change my wi-fi password?
Whenever your device connects to your wi-fi network, it first has to ‘handshake’ with the network to confirm such things as correct password usage before access is granted. The standards that are used in this process, previously thought to be 100% secure, are called WPA2. This new hack does not directly attack the password itself, in fact the hacker will not find your wi-fi password using this attack. Worryingly, this is not a necessity as the hack still gives them access to data being transmitted, regardless of the password used. Therefore simply changing your wi-fi password will not prevent this attack. What needs to be changed is the software running WPA2 on your router, and this isn’t something that you can change yourself. Developers will need to write new versions of this software in order to ‘plug the gap’.
The new exploit (called KRACK – short for Key Reinstallation Attack) is what is known as a ‘man in the middle’ attack. The hacker will need to be in range of your device, at which point they can setup a wi-fi access point that mimics your existing and legitimate wi-fi access point in your router. The hacker will send information to your phone forcing it to switch over onto their comprimised access point. The issue here is that many devices now use a default all-zero encryption key to secure their data, and it’s this that allows the hackers to see your information.
At this point, they don’t have your wi-fi password, but they can see the data you are transmitting through their access point. For this reason, changing your wi-fi password won’t help
So what can I do ?
A key part of this attack is the disabling of HTTPS requests. When you access or send information to a website, it is either an HTTP or HTTPS request. HTTPS uses secure encryption and is what gives you the green padlock in the address bar to reassure you that your connection is secure. If you are a victim of the KRACK exploit, you won’t see the green padlock appearing on websites, instead you will get a non-encrypted HTTP version.
At this stage, all you can do is refrain from entering any personal or secure information into any website that doesn’t clearly display a green padlock or ‘secure’ symbol in the address bar. If you are a victim of the attack, and you enter a password into a website, the hacker will have your password details as well. If you notice that you are no longer getting HTTPS versions of websites (i.e. no padlocks) then your network may be compromised. As for other information being transmitted (files, emails etc), if the connection isn’t secure or the data isn’t encrypted, the hacker will have a copy of the data. The saving grace here is that the hacker has to be in wi-fi range of your device to carry out the attack, it is not something that can be done remotely. Therefore attacks will have to be physically targeted.
Aside from this, the industry is now well aware of this exploit and how to fix it. In time, the makers of routers and access points will upgrade the firmware (the software that runs on the device itself) to fill the gap. In many cases such as broadband routers, your ISP will automatically provide a fix to the device over your broadband connection, although it’s not clear how long this will take. Android and Linux devices are also earmarked as being the most at risk, so it’s important to keep your mobile phone software updated in case a fix is released by your network operator.
This website uses cookies to improve your experience. You can opt-out of non essential cookies if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.