by Mathy Vanhoef of imec-DistriNet, KU Leuven, 2017 • KRACK – Key Reinstallation AttaCK • Attackers can use the Key Reinstallation attack to read information that was previously assumed to be safely encrypted. • Can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on… • Weaknesses are in the WPA/WPA2 protocol itself, not in products or implementations. • Originally discovered in 2016. Details of the attack released in October 2017. A follow up paper was released in October 2018. Source: https://www.krackattacks.com/