Dangerous security flaw allows hackers to monitor Wi-Fi networks and steal information
According to TechRadar, a serious security flaw has just been discovered in the IEEE 802.11 Wi-Fi standard that can be easily exploited by hackers to infiltrate and secretly spy on users' networks.
This vulnerability is called 'SSID Confusion', tracked with the code CVE-2023-52424. All operating systems and Wi-Fi devices, regardless of home or mesh networks, using any of the WEP, WPA3, 802.11X/EAP or AMPE protocols are affected by this bug.
According to The Hacker News, if successfully exploiting this vulnerability, an attacker can spoof the trusted Wi-Fi network name (SSID), tricking the user's device into connecting to a malicious Wi-Fi network instead of the SSID. Real. Then, the attacker can commit crimes such as secretly monitoring network traffic, stealing sensitive information such as passwords, bank accounts, emails. of users.
SSID security measures are only activated when the device requests to join a specific network and are not always authenticated. Taking advantage of this vulnerability, an attacker could create a Wi-Fi network with an SSID name similar to the Wi-Fi network the user trusts and use the same credentials to spoof the user's device. when connecting to a Wi-Fi network. At that time, the user's device will automatically connect to the malicious Wi-Fi network created by hackers without even knowing.
However, the 'SSID Confusion' attack only works when the attacker is close to the victim's range to perform an Attack-in-the-Middle attack between the victim and the vulnerable network. trust.
To avoid the risk of SSID Confusion attacks, experts recommend that users update their devices to the latest Wi-Fi version (802.11), use strong passwords for Wi-Fi networks and be careful when connecting. with public Wi-Fi networks and only access websites that use HTTPS connections.
You should read it
- What is IEEE 802? What role does it play in shaping modern internet connection?
- WiFi will reach 1Gbps speed in 2012
- Learn about Wi-Fi 6
- Create a bibliography of reference according to IEEE standards
- WiMax - P.1: WiMax overview
- WiMax gigabit speed creates 4th generation mobile network
- Solve the problem with rogue ISP
- How is GPT and MBR different when partitioning a drive?
May be interested
- How hackers steal 9 million USD from ATM in 1 hourcisco security experts explained the entire process that bad guys apply to withdraw the money with just over 100 real cards.
- Authentication tool on many enterprise VPN applications that are bypassed by hackerssecurity experts have recently discovered that many corporate vpn applications are developed by software companies like palo alto networks, pulse secure, cisco and f5 networks that are hosting authentication cookies and session cookies. unsafe way of scene, capable of allowing an attacker to ignore the default authentication feature.
- SuperVPN has a security flaw, if you are installing it, delete it nowgoogle recently announced the removal of the vpn - supervpn service from its android app store after uncovering major security flaws that allowed hackers to send users to malicious servers.
- Hacker took advantage of the vulnerability in SS7 to steal bank accountsthe ss7 telecommunications vulnerability is no stranger when it not only has the ability to control applications but also steal your bank account information.
- How to secure personal information from images on Windows 10did you know that the images shared daily on social networking sites like facebook and twitter are becoming lucrative opportunities for professional hackers to steal information?
- What hackers get when stealing credit card information?you may think that when hackers successfully steal information from a credit card, the value of appropriation will be very high but it is not.
- It turns out this is how hackers attack your computer through the main screenthe video clearly shows how he entered the user's computer through the main screen, creating a vulnerability on the computer to steal personal information. in this way, the hacker can even change the amount of money in the user's bank account.
- Hackers can spy on Samsung users with pre-installed appssergey toshin - founder of oversecure company specializing in mobile application security, has found more than a dozen vulnerabilities affecting samsung devices, allowing hackers to steal information and track users.
- Hackers can steal data from the Air Gap network computer using Camera IR CCTVrecently, researchers from israel's ben gurion university have described several ways to get sensitive information from computers in this closed network.
- Think before posting anything on social networks, hackers can exploit them to launch attacksthe content you share publicly on social networks can be hacked by people who still walk around the social network to search for photos, videos or anything else that can help them in the vandalism, taking advantage of turn into an attack tool where you work.