AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

WiKI-Eve attack: stealing passwords from WiFi routers

The new technique that compromises the security of Wi-Fi networks, putting user passwords at risk

A new attack called WiKI-Eve exploits a vulnerability in WiFi to intercept passwords typed on smartphones. Researchers found that this attack can guess numeric passwords in less than 100 attempts with 85% accuracy. Improved security measures are needed to protect against this type of attack.

This pill is also available in Italian language

A new attack, called WiKI-Eve, has the ability to intercept unencrypted transmissions from smartphones connected to modern WiFi routers. This attack can infer individual numeric keystrokes with an accuracy rate of up to 90%, thus enabling the theft of numeric passwords. WiKI-Eve takes advantage of beamforming feedback information (BFI), a feature introduced with WiFi 5 (802.11ac) in 2013. BFI allows devices to send information about their location to routers, making it easier to precisely direct signals. However, the vulnerability lies in the fact that BFI data is exchanged in the clear, making it susceptible to interception and immediate use, without the need to hack the hardware or decipher the encryption keys. This security flaw was discovered by a group of researchers from universities in China and Singapore. They conducted tests to recover potential secrets from these transmissions. Their results showed that it is relatively easy to identify numeric keystrokes with an accuracy rate of 90%, decode 6-digit numeric passwords with an accuracy of 85%, and crack strong app passwords with an accuracy rate of approximately 66%.

The WiKI-Eve attack

The WiKI-Eve attack operates in real time, intercepting WiFi signals as you enter your password. To carry out this attack, the attacker must actively monitor the target as they use their smartphone and try to access a specific application. Identifying the target is critical, and the attacker can use an identity indicator in the network, such as a MAC address, which requires some preparatory work. In the main phase of the attack, the attacker captures the time series of the victim's BFI during password entry using a traffic monitoring tool such as Wireshark. Every time the user presses a key, it affects the WiFi antennas behind the screen, generating a distinct WiFi signal. However, the recorded BFI series can blur the boundaries between typings. To address this problem, researchers developed an algorithm to analyze and restore usable data.

Results of the attack

In experiments with WiKI-Eve using a laptop and Wireshark, the researchers also observed that a smartphone could be used as an attack device, although it may have limitations regarding the number of WiFi protocols supported. The experiments, involving 20 participants using different phone models and typing different passwords, showed that WiKI-Eve's typing classification accuracy remained stable at 88.9% when using dispersed recovery and data adaptation algorithms. domain. For six-digit numeric passwords, WiKI-Eve managed to guess them with an 85% success rate in less than one hundred attempts, maintaining a success rate above 75% in all tested environments. However, the distance between the attacker and the access point is critical. Increasing the distance from 1 meter to 10 meters resulted in a 23% decrease in success rate.

In conclusion

The research highlights adversaries' ability to infer secrets without hacking access points, simply by using network traffic monitoring tools and machine learning frameworks. This highlights the need for improved security measures in WiFi access points and smartphone apps, including features such as keyboard randomization, data traffic encryption, signal obscuration, CSI scramble, channel scramble WiFi and more.

Follow us on Facebook for more pills like this

09/12/2023 10:05

Editorial AI

Last pills

Serious vulnerability discovered in Rabbit R1: all user data at riskVulnerability in Rabbit R1 exposes sensitive API keys. What are the privacy risks?

Cyber attack in Indonesia: the new Brain Cipher ransomware brings services to their kneesNew ransomware hits Indonesia: learn how Brain Cipher crippled essential services and the techniques used by hackers

Patelco Credit Union: security incident halts customer services in CaliforniaService disruption and customer frustration: Patelco Credit Union works to resolve security incident

Cyber attack on TeamViewer: immediate response and investigations underwayStrengthened security measures and international collaborations to counter the cyber threat