PCWorld (USA)

KRACK Wi-fi attack threatens all networks: How to stay safe and what you need to know

Update all the things.

- BY BRAD CHACOS AND MICHAEL SIMON

Adevastati­ng flaw in Wi-fi’s WPA ( go.pcworld.com/wipa) security protocol makes it possible for attackers to eavesdrop on your data when you connect to Wi-fi. Dubbed KRACK, the issue affects the Wi-fi protocol itself—not specific products or implementa­tions—and “works against all modern protected Wi-fi networks,” according to Mathy Vanhoef ( go.pcworld. com/vanh), the researcher that discovered it. That means that if your device uses Wi-fi, KRACK likely impacts it. Fortunatel­y, major tech companies are moving quickly to patch

the issue.

Read on for what you need to know about the KRACK Wi-fi vulnerabil­ity, from how it works to how to best protect yourself against it. That starts with updating to IOS 11.1 ( go. pcworld.com/os11) and macos 10.13.1 ( go. pcworld.com/os13) for Apple users, and installing the Android November security patch for Pixel and Nexus devices.

HOW DOES KRACK BREAK WI-FI SECURITY?

KRACK (short for, uh, Key Reinstalla­tion Attack) targets the third step in a four-way authentica­tion “handshake” performed when your Wi-fi client device attempts to connect to a protected Wi-fi network. The encryption key can be resent multiple times during step three, and if attackers collect and replay those retransmis­sions in particular ways, Wi-fi security encryption can be broken.

That’s the Cliffsnote­s version. For a more technicall­y detailed explanatio­n, check out Mathy Vanhoef’s KRACK attacks website ( go.pcworld.com/atta).

WHAT DEVICES ARE AFFECTED BY KRACK?

If your device uses Wi-fi, it’s likely vulnerable to the KRACK Wi-fi security flaw to some degree, though some get it worse than others. We go into greater detail about how particular devices are affected by KRACK in a dedicated section further below.

WHAT HAPPENS WHEN WI-FI SECURITY IS BROKEN?

For starters, the attacker can eavesdrop on all traffic you send over the network. “This can be abused to steal sensitive informatio­n such as credit card numbers, passwords, chat messages, emails, photos, and so on,” Vanhoef explains. For a deeper look at the potential impact, check out Pcworld’s article on what an eavesdropp­er sees when you use an unsecured Wi-fi hotspot ( go.pcworld.com/unse). It’s a few years old, but still illuminati­ng.

The United States Computer Emergency Readiness Team also issued this warning as part of its KRACK security advisory, per Ars Technica ( go.pcworld.com/secu): “The impact of exploiting these vulnerabil­ities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others.” HTTP content injection means the attacker could sneak code into the websites you’re looking at to infect your PC with ransomware or malware.

So yeah, it’s bad. Keep your security shields active, just in case. Pcworld’s guide to the best antivirus software ( go.pcworld. com/soft) can help you select a reliable solution if needed.

IS WI-FI SECURITY BEING BROKEN IN THE WILD?

“We are not in a position to determine if this vulnerabil­ity has been (or is being) actively exploited in the wild,” Vanhoef says. US-CERT’S advisory didn’t include any informatio­n about whether KRACK is being exploited in the wild, either.

“The impact of exploiting these vulnerabil­ities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others.”

Now for some somewhat settling news: Iron Group CTO Alex Hudson says ( go.pcworld.com/iron) an attacker needs to be in range of your Wi-fi network to carry out any nefarious plans with KRACK. “You’re not suddenly vulnerable to everyone on the internet,” he says.

HOW TO PROTECT YOURSELF FROM KRACK’S WI-FI FLAW

Keep your devices up to date! Vanhoef says, “implementa­tions can be patched in a backwards-compatible manner.” That means your device can download an update that protects against KRACK and still communicat­e with unpatched hardware while being protected from the security flaw. Given the potential reach of KRACK, patches are coming quickly from many major hardware and operating system vendors. Up-to-date Windows PCS, for example, are

already protected.

Until those updates appear for other devices, consumers can still take steps to safeguard against KRACK. The easiest thing would be to simply use a wired ethernet connection, or stick to your cellular connection on a phone. That’s not always possible though.

If you need to use a public Wi-fi hotspot— even one that’s password-protected—stick to websites that use HTTPS encryption. Secure websites are still secure even with Wi-fi security broken. The URLS of encrypted websites will start with HTTPS, while unsecured websites are prefaced by HTTP. The Electronic Frontier

Foundation’s superb HTTPS Everywhere browser plug-in ( go.pcworld.com/http) can force all sites that offer HTTPS encryption to use that protection. Alternativ­ely, you can hop on a virtual private network (VPN) to hide all of your network traffic. Don’t trust random free VPNS, though—they could be after your data as well. Pcworld’s guide to the best VPN services ( go.pcworld.com/serv) can help you pick out a trustworth­y provider. And again, keep your antivirus software ( go.pcworld.com/s0ft) up to date to protect against potential code injected malware.

Going forward, the Wi-fi Alliance ( go.pcworld.com/a11i) will require testing for the KRACK WPA2 vulnerabil­ity in its global certificat­ion lab network, so new devices will be protected out of the box.

DEVICE AND ROUTER WI-FI SECURITY FAQ

Is my phone at risk?

KRACK is a different sort of attack than previous exploits, in that it doesn’t go after devices, it goes after the informatio­n you use them to send. So while the data stored on your phone is safe from hacking, whenever

you use it to send a credit card number, password, email, or message over Wi-fi, that data could be stolen.

So my router is vulnerable?

That’s closer, but still not totally accurate. It’s not the device that’s at risk, it’s the informatio­n, so the sites you visit that aren’t HTTPS are most vulnerable.

So I should change my Wi-fi password? Well, you can, but it’s not going to stop the likelihood of attack. The exploit targets informatio­n that should have been encrypted by your router, so the attacker doesn’t need to crack your password to implement it. In fact, it has no bearing on the attack.

So all devices are at risk?

Now you’re getting it. However, while any device that sends and receives data over

Wi-fi is at risk, the researcher­s who uncovered the attack said Android devices were more at risk than other mobile phones.

Great, I have an Android phone. But I’m running Nougat so I’m safe, right? Unfortunat­ely, no. Newer phones running Android 6.0 or later are actually more at risk since there is an existing vulnerabil­ity in the code that compounds the issue and makes it easier to “intercept and manipulate traffic.”

Google expected to have a security patch ready by mid-november, which would promptly roll out to Pixel and Nexus devices. But it could take weeks or even months for Android hardware makers and cellular providers to validate and deploy the patch to other phones and tablets. Many devices, especially older ones, may never receive the update.

So are my iphone and Mac safe?

Safer than Android, but still not entirely safe. Apple rolled out fixes for KRACK in IOS, macos, watchos, and tvos over the past month.

What about Windows PCS?

They’re safe if you stayed updated. Microsoft released a Windows patch ( go.pcworld.com/ patc) to protect against KRACK on October 10, before the vulnerabil­ity was made public.

I run Linux. Am I impenetrab­le to attack? Not quite. Researcher­s actually found that Linux machines were the most vulnerable desktop devices, with a similar bug to the one found in the Android code. Now for the good news: An upstream Linux patch ( go. pcworld.com/upli) is already available, as are

Researcher­s actually found that Linux machines were the most vulnerable desktop devices, with a similar bug to the one found in the Android code.

Krack-blocking updates for Ubuntu ( go.pcworld.com/ untu), Gentoo ( go. pcworld.com/ntoo), Arch ( go.pcworld. com/chli), and Debian ( go.pcworld.com/ bian) distributi­ons. A patch is also available for OPENBSD ( go. pcworld.com/open).

I have automatic updates turned on.

How do I know if my mobile device has been updated?

The quickest way is to check the system’s Software Update tab in your Settings app to see when the most recent version has been updated. More helpfully, Owen Williams is keeping a running list of companies that have distribute­d patches on his Recharged blog ( go.pcworld.com/char). It’s a stellar resource.

What about my router?

First, you should check to see if your router has any pending firmware updates. Most people aren’t as vigilant in updating their routers as they are with their phones or PCS, so log in to your admin page and install any waiting updates. If there aren’t any, it’s a good habit to check back every day, since companies will be rolling out patches over the coming weeks, with some already being implemente­d.

Netgear ( go.pcworld.com/netg), Intel ( go.pcworld.com/inte), Eero ( go.pcworld. com/eer0), and business-focused networking providers already have KRACK router patches available. Eero’s is rolling out automatica­lly as an over-the-air update. The popular DD-WRT open router firmware has designed a patch ( go.pcworld.com/dwrt), but it isn’t available to download yet. Expect it soon.

So should I turn off Wi-fi?

That’s probably not a viable option for most people, but if you’re completely panicstric­ken, then the only way to be completely safe is to avoid using Wi-fi until you know your router has been patched.

 ??  ??
 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from Australia