FragAttacks: how they can devastate your WiFi devices

A new set of fragmentation vulnerabilities have been discovered which have the capacity to affect all WiFi enabled devices dating back to 1997.

There have been 12 identified separate vulnerabilities discovered by New York University Abu Dhabi researcher Mathy Vanhoef, named FragAttacks (fragmentation and aggression attacks) which have a dangerous data exfiltration potential to gather information about the owner of a WiFi enabled device and export it to a within-range attacker or to run malicious code to compromise the device; bypassing WEP and WPA security protocols.

Vanhoef announced that more than 75 tested Wi-Fi devices are affected by at least one of the FragAttacks vulnerabilities, but a majority of the devices are impacted by multiple CVEs. These tested devices included Huawei, Google, Samsung and Apple for mobile devices; computers from Dell, Apple and MSI; Xiaomi and Canon IoT devices; Asus, Linksys and D-Link routers; and Aruba, Lancom and Cisco access points.

Furthermore, the identified CVEs had the capacity to erroneously reassemble fragments encrypted under different keys, process fragmented as full frames and not clear fragments from memory when (re)connecting to a network. These vulnerabilities are named ‘FragAttacks’ due to the issues on how the WiFi network dissipates and then reorders data for easier transmission before reassembly at the receiving endpoint device.

Despite the existence of these unearthed vulnerabilities, WiFi Alliance released a statement saying that “There is no evidence of these vulnerabilities being used against WiFi users maliciously” and suggests protection methods to users through downloading “routine device updates that enable the detection of suspect transmissions or improve adherence to security implementations”

The video below demonstrates how the 12 discovered vulnerabilities can be used as a stepping stone to launch advanced malware attacks:


7.5 Million at risk from out-of-date ISP routers

Consumer watchdog Which? have investigated 13 legacy router models supplied by leading UK internet service providers (ISPs) including EE, Sky, TalkTalk, Virgin Media and Vodafone – a report discovered that around 7.5 million internet users are at risk from out-of-date hardware.

Out of the 13 router models investigated, 9 presented pressing security flaws that are unlikely to be in compliance with upcoming UK government legislation around tackling the security of connected devices.

The new legislation is in response to government figures showing that 49% of UK residents have purchased at least one smart device since the start of the COVID-19 Pandemic. Due to this huge increased national scope of vulnerability to potential cyber-attacks, the proposed legislation will ban easy to guess default passwords across all, enforces policies to make it easier to report software bugs that can be exploited by hackers on legacy or modern hardware.

Kate Bevan, Which?’s Computing Editor, commented that “proposed new government laws to tackle devices with poor security can’t come soon enough – and must be backed by strong enforcement.” Which? are simultaneously pushing for increased transparency from ISPs about how customers automatically or manually update their routers and how they should actively upgrade existing customers who are identified as being in the ‘at risk’ category.

Of those 7.5 million affected, 6 million users currently possess ISP hardware that has not been updated since 2018 and a few instances even as far back as 2016 – meaning that these vulnerable devices have not received security updates for defence against the latest threats posed by cybercrime.

A cluster of three main problems with ISP legacy hardware were identified by Which? ranging from weak default passwords that allow cybercriminals unlimited access to a router from anywhere, a lack of firmware updates and a local network vulnerability issue with EE Brightbox 2 giving potential hackers full control of the router to install malware or malicious spyware.

In response, Virgin Media have openly rejected Which?’s report conclusions; saying that 9 out of 10 customers are using their latest router models and are benefiting from regular router security updates. This sentiment was mirrored by BT Group (owners of EE), TalkTalk and Vodafone who announced that the HHG2500 device included in the Which? report has not been supplied since August 2019.

Devices with weak default passwords: TalkTalk HG635, TalkTalk HG523a, TalkTalk HG533, Virgin Media Super Hub 2, Vodafone HHG2500, Sky SR101 and Sky SR102.

Routers affected by lack of updates: Virgin Media Super Hub, Virgin Media Super Hub 2, Sky SR101, Sky SR102, TalkTalk HG523a, TalkTalk HG533 and TalkTalk HG635.

Routers that passed the Which? security tests: BT Home Hub 3B, BT Home Hub 4A, BT Home Hub 5B and Plusnet Hub Zero 2704N


How to get value from offering public WiFi

Free public Wi-Fi is a popular service for retail, events and hospitality providers to offer, and increasingly becoming an expected service among the public.

This needs careful thought: not least technical considerations like how to keep public networks isolated from work networks, and providing strong enough connectivity to support the user environment.

But most importantly: how should a businesses or organisation to gain value back from providing free Wi-Fi? We take a closer look at some of the best techniques.

 

Authentication & Audience Participation

Most public Wi-Fi networks expect connecting users to ‘authenticate’ by providing details such as their email address or name, and often accepting some terms and conditions of use.

This can be a fantastic marketing opportunity to gather email subscribers, demographic data, survey product popularity, or simply count customers.

Alternatively, commercial quality systems like Cisco Meraki also offer hidden gems like Facebook Authentication – in which the user has to ‘Like’ the business brand or page to gain access. This kind of authentication is superb way of increasing your visibility online by leveraging value from public Wi-Fi – effectively asking the public to become your marketeers via social media.

Physical signage and other real-world marketing can also encourage visitors to share their experience of your venue or event online while their complimentary connectivity is available.

Targeted Advertising

‘Splash’ Pages loaded on the User’s device when they first connect are customisable on many business Wi-Fi platforms, and this creates a perfect opportunity to brand the experience.

Treating this like a regular webpage offers the chance to advertise offers that are time-sensitive, updated seasonally, or promoting key products.

Alternatively, if your audience is large or targeted enough, then this space can be treated like digital real-estate, and sold on as advertising space to others looking to reach an audience.

Footfall Mapping

By combining signal strengths from different access points and triangulating the direction, enterprise systems like Meraki are able to produce animated ‘heatmaps’ of footfall around a site or venue over time.

This is valuable information it itself for public-spaces and retail centres – who rely on being able to control or exploit human travel to maximise sales, minimise costs or optimise the flow of people.

Prompt for Reviews

You’ll never get a more geographically targeted audience than this – so why not ask the key question when it counts?

To online brands in particular, digital reviews are worth serious investment, and smartphone connections direct with the customer is a perfect opportunity to prompt via the web for useful feedback or survey customer satisfaction.

Alternatively ask publicly: and gather Google Reviews, Facebook Ratings, Trustpilot Stars, or any other feedback that is of value to your organisation en masse.

 

For Wi-Fi guidance and networking expertise, please contact our team today


Cisco launch Meraki GO for Small Businesses

Cisco’s Meraki have announced the release of Meraki Go, a new range of wireless access-point infrastructure designed for small businesses and the service sector.

The move suggests Cisco is seeking to expand their enterprise WI-Fi offering to a wider market, supporting smaller installations and public-access areas such as cafes, shops, hotels and small offices. Pricing is currently only available via certain routes (including Lineal), however many expect Go to represent a more cost-effective way to deploy the premium Wi-Fi features for which Cisco’s Meraki technology has become famous.

New access points have been previewed, for both indoor and outdoor settings. Slightly smaller than the enterprise range, these include a simple 1 Year hardware warranty, suggesting the hardware may be better suited to public-access locations, carry a lower cost of entry, and make more regular replacement a viable option.

Not that Cisco have fallen short on the feature set. In addition to web blocking of unwanted websites and usage limits on traffic, Meraki have included the all-important ability to run multiple Wi-Fi networks in parallel via the same hardware – an important tool for the service sector businesses needing both staff and public access Wi-Fi.

Both indoor and outdoor access-point models can be powered via a single ethernet cable from a POE switch to minimise cabling, include wall mountings as standard, and act as a ‘Mesh’ network; passing connected devices between the access-point with the strongest connection, without the need for the end-user to re-connect to the network as they move location.

Like its big brother, Meraki Go will require a subscription (either 1, 3 or 5 years), which provides support and security updates to Meraki’s supporting cloud-management app. As before, system admins can cloud-manage and configure their whole Meraki Go network via the Meraki management app, on PC/Mac, remotely or via their smartphone.

 

For Wi-Fi installations and support, contact Lineal today.


WPA3 Wi-Fi Introduced

The Wi-Fi Alliance has formally announced the introduction of the WPA3 security protocol, the next generation of wireless security to protect routers and networks.

The new security standard follows hot on the heels of last year’s breach of the existing WPA2 standard, which has been in use since 2004.

WPA3, released in both ‘personal’ and ‘enterprise’ with extra protections, is expected to fix a number of deficiencies in the older WiFi protocol, including:

  • Captured encrypted data cannot be decrypted by a later breach of the password – in order to access data, a hacker must have both the password and data at point of transmission.
  • Encryption of data will be individualised, such that snooping on other devices across less secure Wi-Fi networks will be made more difficult.
  • Extra protections against password brute-forcing and ‘dictionary’ style attacks, dramatically increasingly the time cost of bulk guessing a password successfully.
  • Smart devices with no screen, including many Internet-of-things (IoT) technologies, will be administered via a smartphone screen during Wi-Fi setup.

To most end-users, the experience of entering a Wi-Fi key will feel virtually identical. WPA3 isn’t expected to actually be implemented until 2019, and is predicted to gradually replace the existing WPA2 standard on all Wi-Fi certified devices. WPA2 will continue to function, but will be steadily phased out.

Nevertheless, expect to see major manufacturers rushing to ensure their own products are stamped with the very latest security ‘WPA3 Ready’ branding.

For networking and cybersecurity expertise, please contact Lineal today.


Technology firms rush to fix WPA2 KRACK

Technology firms are urgently issuing fixes for the WPA2 KRACK (Key Reinstallation Attack) thought to compromise the WPA2 encryption used in most WiFi routers and other wirelessly enabled devices.

The exploit, discovered and published by Mathy Vanhoef, a Belgian security expert for Imec-Distrinet, Ku Leuven, has caused serious alarm amongst cybersecurity professionals due to the widespread use of WPA2 across millions of items of networked hardware around the World.

Vanhoef’s website, detailing how the the WPA2 KRACK works, demonstrates on video how an unfortunate Android smartphone can be tricked into re-installing an all-zero encryption key, which makes de-crypting data transmitted from the device possible. 

Security guidance remains to continue using WPA2 (rather than reverting to an older encryption standard) and to install the latest WPA2 KRACK security updates from manufacturers as soon as they are available.

A number of key technology vendors were notified in August, giving them some time to prepare. Microsoft are reported to have adjusted “how Windows verifies windows group key handshakes” to fix the issue. Apple and Android are yet to specify exactly when patches will be available, although both are understood to be working on a secure fix to be made available in coming weeks. The more responsive hardware developers, including Cisco and Ubiquiti, yesterday began issuing guidance and new firmware for their wireless equipment.

The Wi-Fi Alliance, the international organisation dedicated to developing Wi-Fi technology, have essentially argued that there is no need to panic. There is no evidence of the extremely serious hack being deployed outside test conditions (yet) – although it’s probably only a matter of time before someone attempts to do so. Because Wi-Fi relies on physical range, it’s likely this could target public Wi-Fi and other easily accessible networks. For this reason, users are (as always) reminded not to use public networks for sensitive tasks, such as online banking.

It’s clear from the increased publicity surrounding the discovery that major vendors of network equipment will be under pressure to issue the required WPA2 KRACK security patches.

However, the underlying vulnerability also threatens a wide range of wirelessly connected internet-of-things (IOT) devices – including everything from CCTV to smart-fridges – such that it’s unclear just how widespread this latest security flaw will actually prove.

For IT support and cybersecurity expertise: get in touch with Lineal today.


How Lineal provided Free Wifi to Barnstaple Town Centre

 

Over Christmas 2015/16, Lineal launched a technical trial to provide free, public-access Wifi across Barnstaple Town Centre.

The pilot scheme, which took place during the busiest shopping period of the year, saw our team solve a number of technical challenges: scoping sites for Wifi access points, installing suitable hardware and managing network connectivity for shoppers and visitors to the town.

With generous support from Barnstaple Town Centre Management (BTCM), North Devon Council and M&E Alarms, we delivered a free wifi network connected to by more than 400 people each day at peak usage.

To build the network itself, we used Cisco Meraki MR-66 ruggedised outdoor routers, fixing a ‘mesh’ grid of interconnected access points high on selected buildings owned by local businesses who agreed to take part. Visitors to the town could connect from any smartphone or other wirelessely enabled device, via a special ‘splash’ page.

Managing Director of Lineal, Mike Matthews, explained: “We wanted to attempt an ambitious project which would benefit our local area. Wider connectivity opens up new ways for people to find out information about upcoming events, for local businesses to advertise, and for visitors to our town to share their enjoyment of Barnstaple with friends and family over social media. There are many possibilities.”

connectivity trial

Throughout the trial period each access point also collected anonymised location data in real-time. With as many as 20,000 wirelessly enabled devices moving within Barnstaple town centre during a 24 hour period, the free Wifi Project was also successfully used to measure footfall patterns in public places, which could one day be used to help local authorities plan for busy periods.

Although the pilot project has now ended, team members from Lineal presented the initial findings to the Barnstaple Town Centre Management, North Devon Council and Devon County Council in February 2016, with a view to launching the network as a more permanent asset for the town in the near future.

 

For more information on cabling & network infrastructure services from Lineal: click here or call us today on 01271 375999