How to Remain Safe from KRACK Wi-Fi Vulnerability

Joined
Oct 20, 2017
Messages
1
Reaction score
0
Points
1
Location
United States
KRACK Wifi Vulnerability, discovered by a research which leads hackers to easily decrypt the data on your router (If that hacker is in the router's range).

My suggestion to IoT device users that. please avoid connecting to Wireless networks. Instead, try to use cellular data while accessing the internet which is a secure option for now.
Apple has already released the fix in their latest iOS version. (Not official)
Microsoft has also released their fix patch and those users who have the updated version of windows are completely secure.
Many router companies have started releasing their fix patches as well. Like T-P Link.
You all should contact your wireless network provider to provide you a fix patch.
Here's a short guide I found today on How to Protect Yourself From KRACK WiFi Vulnerability which may help you.
If anyone finds some useful stuff about this, please do share.
Austin.
 
Joined
Oct 1, 2007
Messages
7,163
Reaction score
275
Points
83
Location
UK
Your Mac's Specs
Mac Mini i5 (2014 High Sierra), iPhone X, Apple Watch, iPad Pro 12.9, AppleTV (4)
Thanks for the post, the issue is certainly worth highlighting to people.

Here's a few additions:
Most IoT devices don't have a cellular option being primarily designed for home Wi-Fi environments.

You're correct that Apple has released a fix into it's beta stream for iOS, MacOS and TVOS. No formal word from Google re:Android.
Microsoft incorporated a fix into it's 10/10 security patching for Windows

Risk:
While vulnerabilities in WPA2 are a big concern, as with all things you need to look at the risk rather than just the vulnerability.
Until all your home Wi-Fi devices are updated or patched any interaction using WPA2 is vulnerable. However, you'd need someone in range of your network, suitably equipped for the attack and with malicious intent. As such, the actual risk of your home network being targeted and exploited is fairly low. WPA2 should still be used and is still the strongest, home use, protocol available to most.

The larger risk is public networks, think coffee shops, shopping centres (malls) etc. At these points, a man in the middle attack becomes more worthwhile for the would-be perpetrator in that they can easily reach multiple targets. Especially if you start to look at public wifi near government buildings, legal institutions etc. As far as public wi-fi goes I'd suggest avoiding use of these, well, always to be honest. They've always been fairly vulnerable to compromise.

The Register has some solid, clickbait-free info and links onto other helpful stuff regarding router updates etc.

VPN's aren't a silver bullet solution but they provide a level of protection and they're something I'd recommend when you have to use public wi-fi, regardless of this new threat.
You also need to look out for HTTPS secured websites. One of the most obvious attacks once wifi connectivity is compromised is to prevent https traffic. Without this you're potentially sending login credentials etc in plain, easily captured and read format
 
Joined
Nov 28, 2007
Messages
25,564
Reaction score
486
Points
83
Location
Blue Mountains NSW Australia
Your Mac's Specs
Silver M1 iMac 512/16/8/8 macOS 11.6
Good response mrplow.

If one MUST use public wifdi make sure the firewall is turned on at least!
 
Joined
May 18, 2008
Messages
3,613
Reaction score
99
Points
48
Location
Amberley, Canterbury, New Zealand
Your Mac's Specs
MacMini 14.3, 8.1 & 4.1, OS 13.5, 10.14, & 10.11 & 10.6; Macbook Pro 8.2, OS 10.12.
Interesting reading, but nowhere did I see mention of the use of ethernet cables, or hard-wiring into pubic routers - if feasible. Are we discussing the use of laptops, or smartphones?

To elaborate, I live in a small town, where there is very little likelihood of someone trying to hack my WPA2 wireless network, but I've still changed to wired ethernet/internet for the foreseeable future.

Coincidentally, where does one acquire the patch that Apple has issued for MacOS, and which OS version?
 
Joined
Nov 28, 2007
Messages
25,564
Reaction score
486
Points
83
Location
Blue Mountains NSW Australia
Your Mac's Specs
Silver M1 iMac 512/16/8/8 macOS 11.6
Either or m,ate, either or.

P.S.Looking for 18 start tonight. Any offers mate?
 

Rod


Joined
Jun 12, 2011
Messages
9,690
Reaction score
1,879
Points
113
Location
Melbourne, Australia and Ubud, Bali, Indonesia
Your Mac's Specs
2021 M1 MacBook Pro 14" macOS 14.4.1, Mid 2010MacBook 13" iPhone 13 Pro max, iPad 6, Apple Watch SE.
There is one step that is easy for everyone and that is to add the extension HTTPS Everywhere:
HTTPS Everywhere is a Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure.
Also Facebook and Twitter have recently added HTTPS Always as an option in settings which is off by default.
Another good argument for a VPN most of which will allow the addition of a mobile device under the same account.
My BIG problem is going to be my Telkomsel provided modem/router, here in Indonesia they provide a Chinese made ZTE device which they insist on me using. They will not accept a 3rd party device so I am dependant on them getting around to applying the patch.
 
Joined
Jul 24, 2013
Messages
5,075
Reaction score
764
Points
113
Location
Ohio (USA)
Your Mac's Specs
2023-14" M3max MBPro, 64GB/1TB, iPhone 15 Pro, Watch Ultra
I am wondering if Apple will provide a patch for the Airport Time Capsule.

Lisa
 
Joined
Oct 1, 2007
Messages
7,163
Reaction score
275
Points
83
Location
UK
Your Mac's Specs
Mac Mini i5 (2014 High Sierra), iPhone X, Apple Watch, iPad Pro 12.9, AppleTV (4)
I am wondering if Apple will provide a patch for the Airport Time Capsule.

Lisa

I would expect so, but only if vulnerable. Not all devices are depending on the way the standard has been implemented.
 
Joined
Oct 1, 2007
Messages
7,163
Reaction score
275
Points
83
Location
UK
Your Mac's Specs
Mac Mini i5 (2014 High Sierra), iPhone X, Apple Watch, iPad Pro 12.9, AppleTV (4)
Interesting reading, but nowhere did I see mention of the use of ethernet cables, or hard-wiring into pubic routers - if feasible. Are we discussing the use of laptops, or smartphones?

To elaborate, I live in a small town, where there is very little likelihood of someone trying to hack my WPA2 wireless network, but I've still changed to wired ethernet/internet for the foreseeable future.

Coincidentally, where does one acquire the patch that Apple has issued for MacOS, and which OS version?

I didn’t mention Ethernet purposefully so as not to muddy the waters further but yes, it will obviously negate a wireless vulnerability providing every wireless device in use can use Ethernet.

As for the Apple patches they are in the current public betas. So you can wait for the full release on enroll on the beta program.
 
Joined
Jan 1, 2014
Messages
629
Reaction score
52
Points
28
Your Mac's Specs
MacBookPro 13 v11.1, i5 2.4 GHz, 256 GBs SSD, 8 GBs DDRs
There is one step that is easy for everyone and that is to add the extension HTTPS Everywhere:
HTTPS Everywhere is a Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure.
Also Facebook and Twitter have recently added HTTPS Always as an option in settings which is off by default.
Another good argument for a VPN most of which will allow the addition of a mobile device under the same account.
My BIG problem is going to be my Telkomsel provided modem/router, here in Indonesia they provide a Chinese made ZTE device which they insist on me using. They will not accept a 3rd party device so I am dependant on them getting around to applying the patch.
I wouldn't put that much faith in to SSL. If the client is exploited with the KRACK-attack and the hacker uses SSLScript, collecting account passwords is trivial:

 

Shop Amazon


Shop for your Apple, Mac, iPhone and other computer products on Amazon.
We are a participant in the Amazon Services LLC Associates Program, an affiliate program designed to provide a means for us to earn fees by linking to Amazon and affiliated sites.
Top