Hackers from the University of the West Indies have uncovered a critical vulnerability in the WPA3 security protocol, once hailed as the most robust safeguard for modern Wi-Fi networks. The team demonstrated how attackers could bypass its defenses and steal user passwords through fraudulent access points.
The vulnerability stems from WPA3’s need to maintain compatibility with the outdated WPA2 standard. When a device that only supports WPA2 connects to the network, the system automatically downgrades to a less secure level of protection.
Criminals exploit this flaw by intercepting portions of the data exchanged between the device and the router during connection. Using this captured information, they create a counterfeit access point. From there, it takes little effort to lure unsuspecting victims.
At the onset of the attack, cybercriminals deliberately sever the connection between the device and the legitimate network, employing various tactics, including DDoS attacks. When the user attempts to reconnect, their device and router initiate the “handshake” process—an exchange of four authentication messages. During this moment, attackers use specialized tools like Wireshark to intercept two of the four messages.
The intercepted data is sufficient to construct a convincing replica of the network with an identical identifier (SSID). This counterfeit access point operates under the WPA2 protocol, effectively bypassing WPA3’s security mechanisms. Unaware of the threat, the user connects to the fake network and enters their password via a spoofed web form.
The researchers noted that the password-entry page could mimic the interface of any network equipment manufacturer. While their experiment employed a simple design, a more sophisticated portal could replicate the branding and style of a specific organization or brand for greater credibility.
WPA3 was designed to shield users from dictionary-based password attacks. The new standard employs a Simultaneous Authentication of Equals (SAE) method, which prevents hackers from guessing passwords offline, as each attempt requires direct interaction with the router. However, this particular weakness was overlooked.
During their experiment, the researchers encountered technical difficulties that prevented them from consistently disrupting the connection. Nonetheless, they proved that users could be tricked into revealing their passwords through social engineering tactics on a fraudulent authentication portal.
This discovery highlights that even the most advanced security protocols remain vulnerable when human error is involved. We often accept occasional disruptions in Wi-Fi connectivity, making us more susceptible to deception.
Users should exercise caution if a network unexpectedly requests a password reentry, especially after an abrupt disconnection. Verifying the authenticity of the access point and employing additional layers of security are critical measures to safeguard against such attacks.