WiFi breach makes devices vulnerable to hacks, but there is a solution

Much to everyone’s concern, there have been discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs), notes krackattacks.com.

The “Krack” attack works by exploiting the “handshake” that a WiFi network and a device give to each other when the latter wants to join. Usually, the two decide on an encryption key for all future traffic, meaning that each device will only be able to read data if it has that key.

“Note that if your device supports Wi-Fi, it is most likely affected,” wrote security researcher Mathy Vanhoef, whose work was noted by the US government.

“This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. The attack works against all modern protected Wi-Fi networks. Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites”, continues the researcher.

Android phones are likely to be the most damaged by the attack. Not only are they already particularly vulnerable, they are also incredibly slow to receive updates – meaning that the patch could take a while to arrive, which is especially concerning now that the exploit is public.

The researchers provided the following video showing the attack in progress against a device running Google’s Android mobile operating system:

Secure unprotected WiFis with CyberGhost VPN

CyberGhost VPN will automatically protect you every time you are using a new WiFi or Internet connection. You will never be vulnerable, again, in a hotel, airport, restaurant, or any other new, public space.

Use WiFis securely with #CyberGhost #VPN | #WPA2 #KRACK #KRACKAttacks Click to Tweet

Using a top-class 256-bit AES encryption technology, CyberGhost VPN protects your privacy and secures you online, even on public, unprotected WiFis. Furthermore, CyberGhost adds an additional layer like HTTPS which secures even non-https connections in a hacked WiFi.

With CyberGhost VPN, all you need to do is choose the WiFi networks on which you want to be protected. Then, our app will automatically start whenever you are using them. Set and forget – you’ll always be protected. Download CyberGhost for free and see for yourself.

If you are already a CyberGhost user on a Windows, iOS or Android device, then simply go to the app and connect to the Protect Wi-Fi / Secure Wi-Fi profile. If you own a Mac, then simply initiate your VPN by clicking on the Start button and you’re good to go.

About the author

Corina Dobre
Corina Dobre

A professional wordsmith, Corina has improved her writing skills through extensive experiences in journalism, advertising and marketing. Curious by nature, she enjoys learning foreign languages and discovering everything, as well as everyone around her.

19 Comments

Leave a comment
  • Cyberghost’s support is horrible so I’m hoping SOMEBODY ca answer this. What’s the difference if you choose “Surf Anonymously” & “Protect Wi-Fi”?

    • Hi Lisa, we very sorry to hear of your Support experience. This might have occurred in a time when our colleagues were outnumbered and had to process a considerable amount of tickets. The Support team is however expanding, so that no customer request is left without a response.
      Now, concerning your question. Let me start by saying that, as you probably already anticipated, regardless of the CyberGhost VPN profile you choose, you connection will be encrypted and your online experience, anonymized.
      However, CyberGhost’s VPN profiles are designed to meet different Internet usage cases, without the need to search for fitting servers and/or prepare the right surroundings by adapting settings. Each one initiates the most optimized settings for the respective case automatically, such as choosing special server types (P2P compliant, for example) and activating useful features (ad blocker, HTTP redirect etc.), thus providing much more than the usual VPN experience.
      When it comes to Surf Anonymously, this set of pre-configurations includes the most reasonable options to ensure anonymous surfing and a stable online privacy.
      Protect Wi-Fi / Secure Wi-Fi, on the other hand, similarly to ‘Surf Anonymously’, offers the most reasonable options for a secured and free Internet stay, but comes also with an automatic Wi-Fi detection, so a secure VPN tunnel is established as soon as you enter a once before visited Hotspot again.
      Hope I’ve managed to clear things up a little bit. If not, drop me a line. Meanwhile, further useful info can be found on our Support page, in the FAQ and Guides sections.

      • Reading the guide, I’m still struggling to understand the situation in which you would choose one over the other. If “Protect my X” tile is the same as “Surf Anonymously” but with an extra feature (protection?) then why ever use “Surf Anonymously”?

        Is the “Protect my x” tile only useful if you expect to be changing networks often and need to have the VPN on for some networks and off for others? How does the “Surf Anonymously” tile handle changing networks? I thought it would simply remain connected to the VPN server with your options the same, thus remaining protected? I feel like this all could be a bit clearer in the interface. Thank you 🙂

        • Hi there, hazyspeaks! Compared to Protect My Wi-Fi, Surf Anonymously also enables you to choose the country you wish to surf the web from. There are slight differences between all our profiles, as this article shows. Otherwise, no matter what you choose from our profiles, your IP will be hidden and your connection, encrypted. Our profiles are designed to meet different Internet usage cases, without the need to search for fitting servers and/or prepare the right surroundings by adapting settings. That is why in this article we are recommending the Protect My Wi-Fi Profile, since we are addressing a global Wi-Fi vulnerability, and for less technical users, this profile is more accessible. More advanced users can fiddle with settings from other profiles, with the same/a similar result. Hope I’ve managed to clear things up a bit. If not, please drop me a line. Cheers!

    • Hi John! Did you encounter any problems with our service? Our colleagues from Support would be more than happy to assist you. Just drop them a line using the Live Chat feature or open a ticket here. Cheers!

  • Guys, you are absolutely amazing! Within the shortest time you added 9 new countries; Albania, Brazil, Bulgaria, Croatia, India, Moldova, Portugal, South Africa, and South Korea! This is very impressive! Keep it up!

    • PS: The only thing I’d like to see now is an option in the account panel to bulk-download all “.OVPN” OpenVPN configuration files for each country. I’m using an external VPN client (Viscosity) and having to download all configuration files separately is very time consuming and a tiny bit annoying. Otherwise, well done! Great service!

  • Cool ..been using dis awesome stuff u jez posted on cyberghost installed on my pc alrdy …just dat, u dnt seem to know hw to protect wifi on mobile android device cos i luv doin it on pc nd would love to do same on my droid

  • Hi there! Even if this sounds crazy: would you be able to offer North Korea as a VPN country?

    Your unsafe and log-keeping competitor HMA! offers this country in their server list. Out of curiosity, I’ve contacted their support to find out how they managed to obtain a VPN server in North Korea. The answer I got was: “You’re correct that some of HMA!’s servers are virtual. We use an IP address of the desired country to disguise your real location, although the physical location of the server may be in a different country. We do this to offer the best VPN service with the fastest speeds and internet connection stability, with the advantage of masking your real location.”.

    Could CyberGhost not use the same technique using virtual servers to provide virtual VPN locations such as North Korea, although the real location of the server is in another, safe country? That would be totally awesome, as you would be, besides the untrustworthy HMA!, the only VPN provider offering this country as a VPN location.

    • Hi there! We are well aware of the the approach some of our competitors have, but we see no point in creating fake server locations, just for the sake of only appearing to be present in more countries. We are very selective with our server providers and that is why we are currently present in “only” 40 countries. Adding North Korea to the list would be too obviously fake, no one would probably believe this and, what’s more, adding a non-democratic country to our server park, when we want to provide digital freedom to those found in such locations, would be against our principles.
      But thank you for getting in touch with us and for your suggestion. For the moment, we will not use virtual servers for North Korea. However, in case we change our minds, we will surely notify you. Cheers and have a good day!

    • Hey Kara!
      First, thank you for using CyberGhost. Regarding the internet connection, most times, this depends on many factors, but you can find out more details about this on our FAQ page . In case this doesn’t answer your question, you can always contact our colleagues from Support or create a ticket here. They’ll be more than happy to help and give you technical instructions.
      Thanks for reaching out and have a lovely day!

    • Hi David! This is something unfortunately I cannot help you with, but my colleagues from Support will surely assist you and help get to the bottom of this. All you need to get in touch with them is simply use the Live Chat feature on this page (in the lower right corner of the page): http://s.cgvpn.net/yv, available between 9.00-18.00 EET (GMT+2), from Monday to Friday. Should you have any other queries, please don’t hesitate to write me. Cheers and have a good day!

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

© 2017 CyberGhost