https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

MSSP Insider


Shutterstock

Malicious hacker at computer with code

FragAttacks Wi-Fi Vulnerabilities Pose Widespread Threat to Individuals, Businesses

  • Written by Edward Gately
  • May 13, 2021
Potential damage could include denial of service, information leakage and to some extent exfiltration.

FragAttacks, a new set of Wi-Fi vulnerabilities, can be exploited to steal user information or attack devices. And every Wi-Fi is affected by by at least one vulnerability.

That’s according to Malwarebytes Labs, which issued a report on the Wi-Fi vulnerabilities. They are mostly in how Wi-Fi and connected devices handle data packets; specifically, how they handle fragments and frames of data packets.

FragAttacks is short for fragmentation and aggregation attacks. Mathy Vanhoef, a Belgian researcher, discovered the vulnerabilities dating back to 1997. He launched a website providing details.

“Three of the discovered vulnerabilities are design flaws in the Wi-Fi standard and therefore affect most devices,” he writes. “On top of this, several other vulnerabilities were discovered that are caused by widespread programming mistakes in Wi-Fi products. Experiments indicate that every Wi-Fi product is affected by at least one vulnerability and that most products are affected by several vulnerabilities.”

All Types of Wi-Fi Affected

Keatron Evans is principal security researcher at Infosec. He’s been responding to emails from individuals panicking over the Wi-Fi vulnerabilities.

Infosec's Keatron Evans

Infosec’s Keatron Evans

“FragAttacks vulnerabilities range from somewhat benign, to what most of us would consider medium-to-severe-level vulnerabilities,” he said. “They affect all types of Wi-Fi because the vulnerabilities exist in the protocols that we use to communicate over Wi-Fi and not any individual device or software. Anyone who uses Wi-Fi devices can be impacted by FragAttacks.”

There should be moderate concern for organizations that use Wi-Fi in the office, and concern about employees using Wi-Fi at home, Evans said.

“Concerns include information leakage with potential for exfiltrating some packets and frames from even protected networks,” he said. “But it’s a long way from opening up devices and networks to something as devastating as remote code execution. It’s possible, but so difficult that we may not see [an] effort in trying to build it out to that level of exploitability.”

Potential damage could include denial of service, information leaks, and to some extent, exfiltration, Evans said.

“Keep in mind, though, most of these vulnerabilities are also known risks of just using wireless in general,” he said.

Definite Danger

There is definitely some danger to businesses and individuals, Evans said.

“Individuals may be more at risk than businesses because individuals are less likely to be using enterprise-level security and controls, and are more likely to be using clear text communications on their wireless networks at home,” he said. “They are also more likely to run unpatched or out-of-date operating systems and software.”

Businesses and individuals need to stay vigilant on all security 101 best practices, Evans said. These include:

  • Keep software and systems patched and up to date. Even if you don’t think you need the updates, apply them anyway. This advice has different implications following the recent SolarWinds incident. But you should still install updates, just with more caution.
  • Only use Wi-Fi internally where it makes business sense. And minimize how often employees use public uncontrolled Wi-Fi such as coffee shops, hotels, airports, etc. These public hotspots are actually the perfect playgrounds to exploit these vulnerabilities.
  • Educate yourself and the workforce on computing securely and using secure Wi-Fi at home.
Tags: MSPs VARs/SIs Best Practices Cloud Mobility & Wireless MSSP Insider Security

Most Recent


  • Phishing
    Twilio Customers' Data Stolen in Phishing Attacks that Trick Employees
    The hackers impersonated Twilio's IT department.
  • Beyond Pride
    'Beyond Pride,' a Free DE&I Webinar on Workplace Culture for LGBTQ+
    Allies and awareness are key to helping LGBTQ+ employees feel safe.
  • Navigate business
    How Partners Can Navigate Economic Uncertainty, Possible Recession Ahead
    The biggest mistake is companies waiting too long to reduce costs.
  • private
    Vista Equity Partners Buying Avalara for $8.4 Billion, Taking It Private
    When completed, Avalara’s shares will no longer trade on the New York Stock Exchange.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • Malicious hacker group
    Big Hack Takes Financial Toll On SolarWinds MSP Spinoff N-Able
  • College classroom
    Community College Ransomware Attack Wreaks Havoc
  • White House
    White House to Private Sector SMEs: Get Serious About Cybersecurity
  • zero trust security
    Leveraging Partner Expertise to Build a Zero-Trust Strategy

Upcoming Events

View all

MSP Summit

September 13, 2022 - September 16, 2022

Channel Partners Conference & Expo

May 1, 2023 - May 4, 2023

Galleries

View all

Images: Telarus Hosts Partner Summit, Gives Partner, Supplier Awards

August 5, 2022

7 Channel People Making Waves This Week at Kaseya, AT&T, Cohesity, More

August 5, 2022

The Gately Report: Zscaler Tracks New, Increasingly Dangerous Ransomware Group, Most Targeted Types of People

August 5, 2022

Industry Perspectives

View all

Seize the Application Modernization Opportunity

August 2, 2022

A Growth Mindset: Your Organization’s Strategic Differentiator

August 1, 2022

Timely Tips for Non-Negotiable Patch Updates

July 29, 2022

Webinars

View all

Outsmarting RaaS: Implementation Strategies To Help Your Clients Before, During, and After a Ransomware Attack

August 23, 2022

Why it is Important to Upgrade Aging Servers and How to use Live Optics to Upgrade Efficiently

August 25, 2022

Executives at Home are Not Alright: An Intro to Digital Executive Protection

September 8, 2022

White Papers

View all

Work Goes Remote – (and Other Top ITOps Trends)

May 25, 2022

The New Bottom Line: How MSPs Can Meet the Healthcare Crisis While Evolving Their Businesses

April 19, 2022

How to build a Security Operations Center (on a budget)

April 4, 2022

Channel Futures TV

View all

Vonage a ‘Single Communications Stack Provider’ for Partners, Customers

IBM, Partners and the $1 Trillion Hybrid Cloud Opportunity

June 26, 2022

Agents Share ‘Secrets,’ Industry Opportunity

May 11, 2022

AT&T, Microsoft, Cisco, ThreatLocker on Unlocking Partner Potential

May 6, 2022

Twitter

ChannelFutures

Bret Hickenlooper of @sumocom is more excited than ever to be in the channel. dlvr.it/SWHhP1 https://t.co/S0YfM2Vpiw

August 8, 2022
ChannelFutures

.@Vista_Equity acquiring @avalara in $8.4 billion deal. #automation dlvr.it/SWHd98 https://t.co/klle3bZMMp

August 8, 2022
ChannelFutures

Hackers access @twilio customer data via #phishing attacks. dlvr.it/SWHWXn https://t.co/dV9bal0vGS

August 8, 2022
ChannelFutures

[email protected] produced a 50-minute webinar on creating a work culture in which LGBTQ+ employees feel safe. You can… twitter.com/i/web/status/1…

August 8, 2022
ChannelFutures

#MSPSummit preview: Surviving, thriving during economic rough seas with @SL-Index's Peter Kujawa.… twitter.com/i/web/status/1…

August 8, 2022
ChannelFutures

.@ConnectWise says use #cyberinsurance policies to protect from worst of cyberattack repercussions, but first beef… twitter.com/i/web/status/1…

August 8, 2022
ChannelFutures

Check out our pictures from the #TelarusPartnerSummit that @telarus hosted in Salt Lake City.… twitter.com/i/web/status/1…

August 5, 2022
ChannelFutures

Channel People Making Waves This Week Include: @spoonen, @RoyArsan, @TheAnneChow, @AnuragTechaisle… twitter.com/i/web/status/1…

August 5, 2022

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X