You have probably heard about the latest vulnerability that affects most modern wi-fi networks.
The possible exploit is called KRACK.
The vulnerability is related to a discovered flaw in the WPA and WPA2 encryption protocols used by most modern wi-fi access points.
WPA and WPA2 (Wi-Fi Protected Access II) are also currently used as a security layer so only authorised devices can connect to your w-fi network
In simple terms, an attacker can adopt a man-in-the-middle position on your Wi-Fi network. They could force access points and client devices to reinstall a different encryption key.The KRACK attack then allows an attacker to intercept wi-fi traffic,.
A criminal could then not only decrypt network traffic from a victim's device on a WPA/2 network, but also hijack connections. In some cases inject malware or ransomware into unencrypted websites you are trying to visit (those not using SSL). Users could also be redirected to malicious websites.
What does this mean for you?
- Don’t panic. No, you do not need to turn off your Wi-Fi network. There have been no known attacks taking advantage of this vulnerability - yet.
- An attack would have to be very sophisticated using special hardware on-site. This limits the potential for concern.
- Disable the 802.11r protocol on your access point as it currently has a particular sort of vulnerability.
- Implement Best Practices.
- Your IT Support provider should already be installing the right firmware updates from your vendors as they become available. You must update both sides of the wi-fi connection - your "client" device (smartphone, laptop, tv, etc.) and the Wi-Fi Access Point (AP) you are connecting to.
- Note some clients Android 6 and Linux devices are more susceptible than others.
- Schedule a regular audit of your Wi-Fi network to ensure best practices are being applied.
- Enable Rogue Detection on your Access Points. This is a feature which detects and blocks devices pretending to be authorised.
- Separate Your Business wired network and your Wireless network.
- Implement RADIUS technology for more robust security authentication on your corporate network.
- Finally, until you are updated, only use sites and services that use HTTPS as they encrypt data from your web browser to the server and back.