KRACK Wi-fi attack: How to stay safe
Adevastating flaw in Wi-fi’s WPA ( go.macworld.com/wfpa) security protocol makes it possible for attackers to eavesdrop on your data when you connect to Wi-fi. Dubbed KRACK, the issue affects the Wi-fi protocol itself—not specific products or implementations—and “works against all modern protected Wi-fi networks,” according to Mathy Vanhoef ( go.macworld.com/math), the researcher that discovered it. That means that if your device uses Wi-fi, KRACK likely impacts it. Fortunately, major tech companies are
moving quickly to patch the issue.
Read on for what you need to know about the KRACK Wi-fi vulnerability, from how it works to how to best protect yourself against it. We’ll repeatedly update this article as more information becomes available.
HOW DOES KRACK BREAK WI-FI SECURITY?
KRACK (short for, uh, Key Reinstallation Attack) targets the third step in a four-way authentication “handshake” performed when your Wi-fi client device attempts to connect to a protected Wi-fi network. The encryption key can be resent multiple times during step three, and if attackers collect and replay those retransmissions in particular ways, Wi-fi security encryption can be broken.
That’s the Cliffsnotes version. For a more technically detailed explanation, check out Mathy Vanhoef’s KRACK attacks website ( go.macworld.com/kraw).
WHAT DEVICES ARE AFFECTED BY KRACK?
If your device uses Wi-fi, it’s likely vulnerable to the KRACK Wi-fi security flaw to some degree, though some get it worse than others. We go into greater detail about how particular devices are affected by KRACK in a dedicated section further below.
WHAT HAPPENS WHEN WI-FI SECURITY IS BROKEN?
For starters, the attacker can eavesdrop on all traffic you send over the network. “This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on,” Vanhoef explains. For a deeper look at the potential impact, check out Pcworld’s article on what an eavesdropper sees when you use an unsecured Wi-fi hotspot ( go.macworld.com/eave). It’s a few years old, but still illuminating.
The United States Computer Emergency Readiness Team also issued this warning as part of its KRACK security advisory, per Ars Technica ( go.macworld. com/arte): “The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others.” HTTP content injection means the attacker could sneak code into the websites you’re looking at to infect your PC with ransomware or malware.
So yeah, it’s bad. Keep your security shields active, just in case. Pcworld’s guide to the best antivirus software ( go. macworld.com/beso) can help you select a reliable solution if needed.
IS WI-FI SECURITY BEING BROKEN IN THE WILD?
“We are not in a position to determine if this vulnerability has been (or is being) actively exploited in the wild,” Vanhoef says. US-CERT’S advisory didn’t include any information about whether KRACK is being exploited in the wild, either.
Now for some somewhat settling news: Iron Group CTO Alex Hudson says ( go. macworld.com/alex) an attacker needs to be in range of your Wi-fi network to carry out any nefarious plans with KRACK. “You’re not suddenly vulnerable to everyone on the internet,” he says.
“The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others.”
HOW TO PROTECT YOURSELF FROM KRACK’S WI-FI FLAW
Keep your devices up to date! Vanhoef says “implementations can be patched in a backwards-compatible manner.” That means that your device can download an update that protects against KRACK and still communicate with unpatched hardware while being protected from the security flaw. Given the potential reach of
KRACK, patches are coming quickly from many major hardware and operating system vendors. Up-to-date Windows PCS, for example, are already protected.
Until those updates appear for other devices, consumers can still take steps to safeguard against KRACK. The easiest thing would be to simply use a wired ethernet connection, or stick to your cellular connection on a phone. That’s not always possible though.
If you need to use a public Wi-fi hotspot—even one that’s password protected—stick to websites that use HTTPS encryption. Secure websites are still secure even with Wi-fi security broken. The URLS of encrypted websites will start with “HTTPS,” while unsecured websites are prefaced by “HTTP.” The Electronic Frontier Foundation’s superb HTTPS Everywhere browser plug-in ( go.macworld.com/htev) can force all sites that offer HTTPS encryption to use that protection. Alternatively, you can hop on a virtual private network (VPN) to hide all of your network traffic. Don’t trust random free VPNS, though—they could be after your data as well. Pcworld’s guide to the best VPN services ( go.macworld.com/ bvpn) can help you pick out a trustworthy provider. And again, keep your antivirus software ( go.macworld.com/beso) up to date to protect against potential code injected malware.
Going forward, the Wi-fi Alliance ( go.macworld.com/alli) will require testing for the KRACK WPA2 vulnerability in its global certification lab network, so new devices will be protected out of the box.
DEVICE AND ROUTER WI-FI SECURITY FAQ
Is my phone at risk?
KRACK is a different sort of attack than previous exploits, in that it doesn’t go after devices, it goes after the information you use them to send. So while the data stored
on your phone is safe from hacking, whenever you use it to send a credit card number, password, email, or message over Wi-fi, that data could be stolen.
So my router is vulnerable?
That’s closer, but still not totally accurate. It’s not the device that’s at risk, it’s the information, so the sites you visit that aren’t HTTPS are most vulnerable.
Oh, so I should change my Wi-fi password then?
Well, you can, but it’s not going to stop the likelihood of attack. The exploit targets information that should have been encrypted by your router, so the attacker doesn’t need to crack your password to implement it. In fact, it has no bearing on the attack whatsoever.
So all devices are at risk?
Now you’re getting it. However, while any device that sends and receives data over Wi-fi is at risk, the researchers who uncovered the attack said Android devices were more at risk than other mobile phones.
Great, I have an Android phone. But I’m running Nougat so I’m safe, right? Unfortunately, no. Newer phones running Android 6.0 or later are actually more at risk since there is an existing vulnerability in the code that compounds the issue and makes it easier to “intercept and manipulate traffic.”
Google expects to have a security patch ready for November 6, which should promptly roll out to Pixel and Nexus devices. But it could take weeks or even months for Android hardware makers and cellular providers to validate and deploy the patch to other phones and tablets. Many devices, especially older ones, may never receive the update.
So are my iphone and Mac safe?
Safer than Android, but still not entirely safe. Apple said in a statement that all current IOS, macos, watchos, and tvos betas include a fix for KRACK. It will be rolling out to all devices within a few weeks.
What about Windows PCS?
They’re safe if you stayed updated. Microsoft released a Windows patch ( go. macworld.com/wpat) to protect against KRACK on October 10, before the vulnerability was made public.
I run Linux. I’m impenetrable to attack, right?
Not quite. Researchers actually found that Linux machines were the most vulnerable desktop devices, with a similar bug to the one found in the Android code. Now for the good news: An upstream Linux patch ( go.macworld.com/upst) is already
available, as are KRACKblocking updates for Ubuntu ( go.macworld.com/ubun), Gentoo ( go.macworld.com/ gent), Arch ( go.macworld.com/ arch), and Debian ( go. macworld.com/debi) distributions. A patch is also available for OPENBSD ( go.macworld.com/obsd).
I have automatic updates turned on. How do I know if my mobile device has been updated?
The quickest way is to check the system’s software updates tab in your Settings app to see when the most recent version has been updated. More helpfully, Owen Williams is keeping a running list of companies that have distributed patches on his Recharged blog ( go.macworld.com/ rech). It’s a stellar resource.
What about my router?
First, you should check to see if your router has any pending firmware updates. Most people aren’t as vigilant in updating their routers as they are with their phones or PCS, so log into your admin page and install any waiting updates. If there aren’t any, it’s a good habit to check back every day, since companies will be rolling out patches over the coming weeks, with some already being implemented.
Netgear ( go.macworld.com/gear), Intel ( go.macworld.com/intl), Eero ( go.macworld. com/ero1), and business-focused networking providers already have KRACK router patches available. Eero’s is rolling out automatically as an over-the-air update. The popular DD-WRT open router firmware has designed a patch ( go. macworld.com/trac), but it isn’t available to download yet. Expect it soon.
So should I turn off Wi-fi?
That’s probably not a viable option for most people, but if you’re completely panic-stricken, then the only way to be completely safe is to avoid using Wi-fi until you know your router has been patched. ■