Hackers Can Use the SSID Stripping Flaw to Mimic Real Wireless APs

This article has been indexed from E Hacking News – Latest Hacker News and IT Security News

 

A group of researchers discovered what appears to be a new way for threat actors to mislead people into connecting to their wireless access points (APs). The method, called SSID Stripping, was revealed on Monday by AirEye, a wireless security company. It was discovered in conjunction with Technion – Israel Institute of Technology researchers.
Simply put, unwary users might be duped into connecting to hacker-created Wi-Fi hotspots. This vulnerability exposes users to data theft as well as access to their personal information on their devices. Because it affects nearly all software systems, including MS Windows, macOS, Apple iOS, Ubuntu, and Android, SSID Stripping has emerged as a serious concern. 
A user can see a connection that resembles the name of one of their trusted connections in an SSID Stripping attack, according to researchers. The catch is that the user must manually join the false network. The network, on the other hand, will get through the device’s security restrictions since the original SSID name will be saved in the string the attacker has added, which the user won’t be able to see on the screen. As a result, people will connect to the phoney AP.
“The SSID published by any AP in the proximity of a wireless client is processed by that client – regardless of whether there is any trust between the client device and the AP. Hence an attacker may attempt to include malicious payload within the SSID in an attempt to exploit a vulnerable client implementation,” researchers noted. 
They were able to create three different sorts of “display errors,” as

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

Read the original article: Hackers Can Use the SSID Stripping Flaw to Mimic Real Wireless APs