×

UPSC Courses

DNA banner

DAILY NEWS ANALYSIS

  • 03 March, 2020

  • 3 Min Read

KrOOk vulnerability

KrOOk vulnerability

Syllabus subtopic: Basics of Cyber Security

Prelims and Mains focus: about KrOOk and its threat

News: At the RSA 2020 security conference in San Francisco, security researchers from Slovak antivirus company ESET will present details about a new vulnerability that impacts WiFi communications.

What is it?

  • Named Kr00k, this bug can be exploited by an attacker to intercept and decrypt some type of WiFi network traffic (relying on WPA2 connections).

  • According to ESET, Kr00k affects all WiFi-capable devices running on Broadcom and Cypress Wi-Fi chips. These are two of the world's most popular WiFi chipsets, and they are included in almost everything, from laptops to smartphones, and from access points to smart speakers and other IoT devices.

  • ESET researchers said they personally tested and confirmed that Kr00k impacts devices from Amazon (Echo, Kindle), Apple (iPhone, iPad, MacBook), Google (Nexus), Samsung (Galaxy), Raspberry (Pi 3) and Xiaomi (Redmi), but also access points from Asus and Huawei.

  • ESET said it believes that more than a billion devices are vulnerable to Kr00k, and they consider this number "a conservative estimate."

What’s Kr00K and how does it work?

  • At the technical level, Kr00k is just a bug, like many other bugs that are being discovered on a daily basis in the software that we all use.

  • The difference is that Kr00k impacts the encryption used to secure data packets sent over a WiFi connection.

  • Typically, these packets are encrypted with a unique key that depends on the user's WiFi password. However, ESET researchers say that for Broadcom and Cypress Wi-Fi chips, this key gets reset to an all-zero value during a process called "disassociation."

  • Disassociation is something that occurs naturally in a WiFi connection. It refers to a temporary disconnection that usually happens due to a low WiFi signal.

  • WiFi devices enter into disassociated states many times a day, and they're automatically configured to re-connect to the previously used network when this happens.

  • ESET researchers say that attackers can force devices into a prolonged disassociated state, receive WiFi packets meant for the attacked device, and then use the Kr00k bug to decrypt WiFi traffic using the all-zero key.

  • This attack scenario allows hackers to actively intercept and decrypt WiFi packets, normally considered to be secure.

  • The good news is that the Kr00k bug only impacts WiFi connections that use WPA2-Personal or WPA2-Enterprise WiFi security protocols, with AES-CCMP encryption.

  • This means that if you use a device with a Broadcom or Cypress WiFi chipset, you can protect yourself against attacks by using the newer WPA3 WiFi authentication protocol.

Not as bad as KRACK

  • All in all, the Kr00k vulnerability should be easier to protect against than KRACK -- a major vulnerability that impacted the WPA2 WiFi protocol and forced most device vendors to switch to using WPA3 by default.

  • A new KRACK attack, named Dragonblood, was later discovered to impact even some newer WPA3 connections, but this newer attack didn't impact the entire WiFi ecosystem as the original KRACK attack did.

  • ESET researchers said they discovered Kr00k while looking into the devastating effects of the KRACK attack; however, the two -- KRACK and Kr00K -- should not be considered the same.

Source: The Hindu


India–Azerbaijan

A year after tensions arising from Operation Sindoor, India and Azerbaijan have taken steps to restore and normalise bilateral relations. The 6th round of Foreign Office Consultations, held in Baku, marked the first such engagement since 2022, signaling renewed diplomatic momentum. Recent Diplomatic Engagement During the consultations, bo

India–Australia Economic Cooperation and Trade Agreem

The India–Australia Economic Cooperation and Trade Agreement has completed four years since its signing. Both countries now aim to build on this progress through strengthened collaboration and ambitious targets, including reaching AUD 100 billion in bilateral trade by 2030. What is the India–Australia Economic Cooperation and Tra

ADR Report on Political Funding

A recent report by the Association for Democratic Reforms (ADR) analyses donations of ?20,000 or more declared to the Election Commission of India (ECI) by national political parties for FY 2024–25, highlighting transparency and accountability in political financing. Key Findings Massive Funding Surge Total donations to nationa

Maritime Chokepoints

Maritime chokepoints are narrow channels along global shipping routes where maritime traffic is concentrated. These points are geopolitically and economically critical, as they handle a large proportion of global trade, especially energy shipments. Current Relevance Over two-thirds of seaborne energy trade passes through a handful o

US-Israel-Iran War

Following the launch of Operation Epic Fury (U.S.) and Operation Roaring Lion (Israel), the geopolitical landscape has shifted fundamentally with the confirmed death of Iran’s Supreme Leader, Ayatollah Ali Khamenei.Iran retaliated through Operation True Promise 4, launching missile attacks against Israel and nearby Gulf states. The escala

DNA

05 Apr,2026

Toppers

Search By Date

Newsletter Subscription
SMS Alerts

Important Links

UPSC GS Mains Crash Course - RAW