Massive WiFi Flaw Affects All Connected Devices: ‘You Have To Wonder If It Was Corrupted On Purpose’

by Mac Slavo | Oct 16, 2017 | Conspiracy Fact and Theory, Emergency Preparedness, Experts, Headline News | 38 comments

[dipl_text_animator animated_text=”Do you LOVE America? | Do you WANT our borders secured? | Don’t miss on the latest news | Subscribe and stay informed!” animation_layout=”zoom” animation_time=”740ms” animation_hold=”5010ms” _builder_version=”4.24.0″ _module_preset=”default” global_text_settings_text_align=”center” global_text_settings_text_color=”#FFFFFF” global_colors_info=”{}”][/dipl_text_animator]
[contact-form-7 id=”6521033″ title=”Article Subscribe”]

Share

wifi

The security protocol used to protect the vast majority of WiFi connections has been broken.  This will expose wireless internet traffic to malicious attack, according to the researcher who discovered this weakness.

It doesn’t bode well that the mainstream media is also ignoring this problem completely because it’s a very big deal. Anytime the mainstream media brushes something off, most start asking questions.  Unfortunately, none of the answers we have so far to those questions are of comfort.

Considering every single cellphone now has WiFi in it and this major “weakness” could affect almost everyone. According to ARS Technica, researchers have disclosed a serious weakness in the WPA2 protocol that allows attackers within range of vulnerable device or access point to intercept passwords, e-mails, and other data presumed to be encrypted, and in some cases, to inject ransomware or other malicious content into a website a client is visiting.

The proof-of-concept exploit is called KRACK, short for Key Reinstallation Attacks. The research has been a closely guarded secret for weeks ahead of a coordinated disclosure that was scheduled for 8am Monday, East Coast time. A website disclosing the vulnerability said it affects the core WPA2 protocol itself and is effective against devices running the Android, Linux, macOS, Windows, and OpenBSD operating systems, as well as MediaTek Linksys, and other types of devices. The site warned attackers can exploit it to decrypt a wealth of sensitive data that’s normally encrypted by the nearly ubiquitous Wi-Fi encryption protocol. –ARS Technica

“This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on,” researcher Mathy Vanhoef, of the Katholieke Universiteit Leuven in Belgium wrote. “The attack works against all modern protected Wi-Fi networks. Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites.”

Krack Attacks, the website, went on to warn that visiting only HTTPS-protected Web pages wasn’t automatically a remedy against the attack either.  Since many improperly configured sites can be forced into dropping encrypted HTTPS traffic and instead of transmitting unencrypted HTTP data, this is not a safer option. An attacker can use a script known as SSLstrip to force a site like match.com (dating website) to downgrade a connection to HTTP. The attacker is then able to steal an account when the Android device logs in.

The video below shows how this weakness can be exploited on an Android device.

“Although websites or apps may use HTTPS as an additional layer of protection, we warn that this extra protection can (still) be bypassed in a worrying number of situations,” the researchers explained. “For example, HTTPS was previously bypassed in non-browser software, in Apple’s iOS and OS X, in Android apps, in Android apps again, in banking apps, and even in VPN apps.”

The main concern is that cell phones which have this weakness won’t get upgraded with the “patch” or the fix for this until it’s discarded and new phone replaces it.  Virtually every cell phone out there has WiFi in it. Most are eventually orphaned by their manufacturers, receiving no future updates at all.  These devices, along with nearly all “consumer” WiFi access points in homes and small businesses will never be fixed and always open to attacks.  In addition to the unavailability of a cell phone patch, the majority of consumer and small-business WiFi access points will never be patched either and could remain vulnerable for years if not a decade or longer.

When something this disturbing is found one often wonders if the process was corrupted either negligently or on purpose. Especially considering this wasn’t found sooner.

[the_ad_group id=”24571″]

URGENT ON GOLD… as in URGENT

It Took 22 Years to Get to This Point

Gold has been the right asset with which to save your funds in this millennium that began 23 years ago.

Free Exclusive Report

The inevitable Breakout – The two w’s

[email-download download_id=”345496″ contact_form_id=”19fc5e7″]

Related Articles

[the_ad_group id=”30340″]

Comments

Join the conversation!

It’s 100% free and your personal information will never be sold or shared online.

0 Comments

Submit a Comment

Commenting Policy:

Some comments on this web site are automatically moderated through our Spam protection systems. Please be patient if your comment isn’t immediately available. We’re not trying to censor you, the system just wants to make sure you’re not a robot posting random spam.

This website thrives because of its community. While we support lively debates and understand that people get excited, frustrated or angry at times, we ask that the conversation remain civil. Racism, to include any religious affiliation, will not be tolerated on this site, including the disparagement of people in the comments section.

[dipl_ajax_search search_placeholder=”Article Search” display_fields=”on|on|off|off” search_result_box_bg_color=”#870404″ search_icon_font_size=”20px” search_icon_color=”#870404″ loader_color=”#870404″ _builder_version=”4.17.4″ _module_preset=”default” search_result_item_title_font_size=”14px” search_result_item_excerpt_font_size=”11px” border_color_all_form_field=”#870404″ global_colors_info=”{}”][/dipl_ajax_search]

[the_ad_group id=”30343″]

[the_ad_group id=”30344″]

[620studio_custom_posts post_type=”report” columns=”1″ limit=”1″ category_id=”23503″ caption=”no” date=”no” title=”no”]