Netmon Services

What You Need to Know About the WPA2 KRACK Vulnerability

By Netmon Services

A major vulnerability in the WPA2 Wi-Fi protocol was recently disclosed, affecting nearly every Wi-Fi enabled device. Known as the KRACK attack (Key Reinstallation Attack), it allows hackers to intercept your network traffic and steal sensitive data like credit card numbers and passwords. Here’s what you need to know to stay protected.

Am I Affected?

Yes. This vulnerability affects every Wi-Fi enabled device—laptops, phones, tablets, smart TVs, and even Macs—because it targets a flaw in the WPA2 protocol itself.

How Does KRACK Work?

When a device connects to Wi-Fi, it negotiates encryption keys with the router. KRACK tricks devices into reinstalling an already-used encryption key, effectively bypassing encryption. This allows attackers to intercept what should be secure traffic.

How Bad Is It?

The good news is that most secure websites use HTTPS encryption, which provides an extra layer of protection even if your Wi-Fi is compromised. Sites like Facebook, Gmail, banking portals, and Office 365 are still safe. However, unencrypted sites or old email protocols like POP3 remain vulnerable.

Who Should Worry?

If you still use outdated email services or visit websites without HTTPS encryption, your data is at risk. POP3 email traffic is often unencrypted, making it a target for interception. Businesses using legacy software or websites should evaluate their exposure to unencrypted traffic.

What’s the Fix?

Vendors have released patches for many affected devices. Windows PCs with auto-updates have likely already been patched. However, Wi-Fi access points also require updates. Netmon clients using Ubiquiti APs with auto-updates enabled are protected. At the time of writing, most major vendors (except Apple, Google, and Cisco) have released patches.

Need Help Patching?

If you're unsure whether your environment is protected, contact Netmon for assistance. Managed services clients will be contacted to schedule updates once patches are available for their systems.

← View All Articles
[ffb_section_0 unique_id=”1ktdf4a3″ data=”%7B%22o%22%3A%7B%22gen%22%3A%7B%22ffsys-disabled%22%3A0%2C%22ffsys-info%22%3A%22%7B%7D%22%2C%22type%22%3A%22fg-container-large%22%2C%22no-padding%22%3A0%2C%22no-gutter%22%3A0%2C%22gutter-size%22%3A%22%22%2C%22match-col%22%3A0%2C%22force-fullwidth%22%3A0%7D%7D%7D”][ffb_column_1 unique_id=”1ktdf4a4″ data=”%7B%22o%22%3A%7B%22gen%22%3A%7B%22ffsys-disabled%22%3A%220%22%2C%22ffsys-info%22%3A%22%7B%7D%22%2C%22xs%22%3A%2212%22%2C%22sm%22%3A%22unset%22%2C%22md%22%3A%2212%22%2C%22lg%22%3A%22unset%22%2C%22is-centered%22%3A%220%22%2C%22is-bg-clipped%22%3A%220%22%2C%22xs-last%22%3A%22no%22%2C%22sm-last%22%3A%22unset%22%2C%22md-last%22%3A%22unset%22%2C%22lg-last%22%3A%22unset%22%2C%22xs-offset%22%3A%22unset%22%2C%22sm-offset%22%3A%22unset%22%2C%22md-offset%22%3A%22unset%22%2C%22lg-offset%22%3A%22unset%22%2C%22xs-pull%22%3A%22unset%22%2C%22sm-pull%22%3A%22unset%22%2C%22md-pull%22%3A%22unset%22%2C%22lg-pull%22%3A%22unset%22%2C%22xs-push%22%3A%22unset%22%2C%22sm-push%22%3A%22unset%22%2C%22md-push%22%3A%22unset%22%2C%22lg-push%22%3A%22unset%22%2C%22xs-overlap%22%3A%22no%22%2C%22sm-overlap%22%3A%22unset%22%2C%22md-overlap%22%3A%22unset%22%2C%22lg-overlap%22%3A%22unset%22%7D%7D%7D”][ffb_image_2 unique_id=”1ktdjkb0″ data=”%7B%22o%22%3A%7B%22gen%22%3A%7B%22ffsys-disabled%22%3A%220%22%2C%22ffsys-info%22%3A%22%7B%7D%22%2C%22img%22%3A%7B%22img%22%3A%22%7B%5C%22id%5C%22%3A4190%2C%5C%22url%5C%22%3A%5C%22https%3A%2F%2Fwww.netmonservices.com%2Fwp-content%2Fuploads%2F2017%2F10%2Ffeatured-image-krack.jpg%5C%22%2C%5C%22width%5C%22%3A1200%2C%5C%22height%5C%22%3A630%7D%22%2C%22fullwidth%22%3A%221%22%7D%2C%22blank%22%3A%22null%22%7D%2C%22b-m%22%3A%7B%22pd-xs%22%3A%7B%22b%22%3A%2240%22%7D%7D%7D%7D”][/ffb_image_2][ffb_paragraph_2 unique_id=”1ktdf7jc” data=”%7B%22o%22%3A%7B%22gen%22%3A%7B%22ffsys-disabled%22%3A%220%22%2C%22ffsys-info%22%3A%22%7B%7D%22%2C%22text-is-richtext%22%3A%221%22%2C%22align%22%3A%22text-left%22%2C%22align-sm%22%3A%22%22%2C%22align-md%22%3A%22%22%2C%22align-lg%22%3A%22%22%7D%7D%7D”][ffb_param route=”o gen text”] In the previous week a vulnerability in the WPA2 protocol that is used for wifi devices was disclosed that could put you at risk of letting hackers get hold of your credit card details and personal data. Here’s all you need to know about the Krack hack, including how you can protect yourself from malicious intruders to your network. It is called a Key Reinstallation Attack, shortened to Krack. The weakness in the system allows hackers to break into nearby wifi networks to download malware or intercept personal data like photos, passwords and credit card numbers. In light of the situation, we’ve prepared a very brief summary of the potential impact of this flaw and what you can do to safeguard your devices and your data. [/ffb_param][/ffb_paragraph_2][ffb_paragraph_2 unique_id=”1ktdioof” data=”%7B%22o%22%3A%7B%22gen%22%3A%7B%22ffsys-disabled%22%3A%220%22%2C%22ffsys-info%22%3A%22%7B%7D%22%2C%22text-is-richtext%22%3A%221%22%2C%22align%22%3A%22text-left%22%2C%22align-sm%22%3A%22%22%2C%22align-md%22%3A%22%22%2C%22align-lg%22%3A%22%22%7D%7D%7D”][ffb_param route=”o gen text”]   Am I affected? -Yes. This is a flaw in WPA2 itself, the protocol responsible for negotiating encrypted Wi-Fi connections, as such every WIFI enabled device is affected by this, laptops, TVs, tablets, phones, and even Macs!   How does the WPA2 Krack attack work? When a wireless device first connects to an access point, the two will first need to negotiate how they intend to encrypt their traffic. During this process they exchange a first key, after this key is exchanged they then continuously change their keys (use once, discard, use new key). The attack works by convincing the wireless device that it didn’t receive this initial first key, causing the device to re-install and use this first initial key. So long as an attacker can maintain this confusion, network traffic becomes essentially unencrypted.   How bad is it? Here’s the good part. It’s not as bad as it seems. There’s been a massive push recently to change the web from HTTP to HTTPS. HTTPS uses its own layer of encryption above and beyond WPA2. All https:// web sites, such as Facebook, Google Search, Google Apps, Gmail, Banking institutions, Office 365 and etc. are still safe and secure. E-mail hosted on modern providers is also safe as it uses its own encryption as well. Gmail, Outlook Live, etc.   Who should worry? If you’re using what’s known as ‘pop3’ e-mail, such as those provided by older ISPs, there is a very good chance that no extra encryption is being used for your e-mail traffic. This means that your username and password are being sent in plain text and an attacker could intercept those credentials with ease. If you’re still using a pop3 account, you should consider upgrading to a modern e-mail provider immediately. If you visit un-encrypted web sites, this vulnerability allows the potential for what’s known as man-in-the-middle attack. Which basically means injecting malware, or fraudulent data, into otherwise ordinary looking web sites.   What’s the fix? There is a very simple fix for this, of which most vendors have already provided patches. The difficulty is that every single wireless device will need to be patched. If you use a windows PC with automatic updates, you’ve already been patched. However, the access point your PC connects to also needs this patch. Netmon customers using Ubiquity APs with automatic updates enabled have already been patched as well. As of the time of this writing, all major vendors with the exception of Apple, Google, and Cisco have provided full fixes for this issue.   When can I be patched? Please contact Netmon if you’d like assistance patching your devices. Managed services customers will be contacted to schedule a maintenance window once relevant patches have been made available for their environment. [/ffb_param][/ffb_paragraph_2][/ffb_column_1][/ffb_section_0]