Skip to main content

Wi-Fi vulnerability could allow attackers to steal your data on unencrypted sites

Casezy/Getty Images

Computer scientists at the University of California, Riverside, have discovered a security flaw that affects all Wi-Fi routers. Hackers could exploit the weakness in the transmission control protocol (TCP) and perform a web cache poisoning attack to steal passwords, login information, and other private data. Unfortunately, a fix isn’t possible, as the vulnerability stems from a 20-year-old design based on TCP and Wi-Fi. To prevent hackers from using the exploit, researchers recommend that manufacturers build routers that operate on different frequencies for transmitting and receiving data.

Fortunately, this attack technique won’t work with encrypted sites that use HTTPS and HSTS. Users on Ethernet connections are similarly not affected. Given that the attack won’t work on encrypted sites, most users who browse the internet on a modern browser shouldn’t be affected. Many browsers, including Google’s Chrome, already warn users if they visit an unencrypted site.

Recommended Videos

TCP works by breaking down data into manageable chunks, called packets, for computers to communicate. The data packets begin with a random first number, but the subsequent numbers in the sequence will predictably increase, and hackers can guess the next number to intercept communication between the sending and receiving computers. Given that there are approximately 4 billion sequence numbers, it is difficult for hackers to make a correct guess.

“But if the attacker can figure out which number triggers a response from the recipient, they can figure out the rough range of the correct number and send a malicious payload pretending that it comes from the original sender,” the researchers wrote in a blog post detailing the attack. “When your computer reassembles the packets, you’ll see whatever the attacker wants.”

When the victim visits a website that’s controlled by the hacker — who can be connected remotely using a different Wi-Fi network — the site will run a JavaScript that creates a TCP connection to a banking website. The exploit will work if the victim stays on the site for as little as 1 minute. Hackers can display pirated movies, for example, in an attempt to lure the victim to stay on the site for longer. While the victim is on the site, the hacker can guess the sequence number for the banking packet and inject a malicious copy of the bank webpage into the victim’s cache to steal passwords and login information.

This web cache poisoning tactic ensures that the victim will always see the malicious site whenever they try to visit the banking website in the future, and the malicious copy of the site can sit in the browser cache for deacdes or until the victim clears the cache.

Chuong Nguyen
Silicon Valley-based technology reporter and Giants baseball fan who splits his time between Northern California and Southern…
What is Wi-Fi 7: Everything you need to know about 802.11be
Checking a Wi-Fi router and internet connection on a phone.

Wi-Fi 7 is the latest evolution in the 802.11 IEEE standard of wireless networking, and it's the direct sequel to Wi-Fi 6 and Wi-Fi 6E. It's faster, offers improved support for a greater number of simultaneous connections, and will be more adaptable, to better maintain low-latency connections. It will be an excellent solution for streaming ultra-high-definition video to multiple devices simultaneously, and may find use in future wireless virtual reality and augmented reality headsets.

There aren't many Wi-Fi 7 devices or routers available just yet, but a soft launch has already begun in China, and that rollout will gather sped in the coming years. To get you ready for the next generation of Wi-Fi technology, here's everything you need to know about Wi-Fi 7.

Read more
These are the airports that actually have really fast public Wi-Fi
MacBook Air sitting on a table in an airport.

With the holiday travel season quickly approaching, there is expected to be an increased number of travelers at airports across the U.S., and therefore significantly more people attempting to connect to free airport Wi-Fi at the same time.

Stable connections for free Wi-Fi hot spots can be a hassle in any location, but airport travel offers a unique situation, where internet speed options can vary depending on whether they are free or paid, or a perk of another subscription service.

Read more
This Wi-Fi security flaw could let drones track devices through walls
Professor Ali Abedi flying Wi-Peep standing against brick wall.

A research team from the University of Waterloo has attached a device to a drone that can use vulnerabilities in Wi-Fi networks to see through walls.

Imagine intruders being able to track people by the devices they have on them or find weak spots in their homes. This alarming possibility has been proven by a device called Wi-Peep, which is essentially $20 of easily-purchasable hardware, an off-the-shelf quadcopter, and the work of Dr. Ali Abedi and his team at the University of Waterloo.

Read more