Hackers Can Use the SSID Stripping Flaw to Mimic Real Wireless APs

From ehackingnews.com

A group of researchers discovered what appears to be a new way for threat actors to mislead people into connecting to their wireless access points (APs). The method, called SSID Stripping, was revealed on Monday by AirEye, a wireless security company. It was discovered in conjunction with Technion – Israel Institute of Technology researchers.
Simply put, unwary users might be duped into connecting to hacker-created Wi-Fi hotspots. This vulnerability exposes users to data theft as well as access to their personal information on their devices. Because it affects nearly all software systems, including MS Windows, macOS, Apple iOS, Ubuntu, and Android, SSID Stripping has emerged as a serious concern. 
A user can see a connection that resembles the name of one of their trusted connections in an SSID Stripping attack, according to researchers. The catch is that the user must manually join the false network. The network, on the other hand, will get through the device’s security restrictions since the original SSID name will be saved in the string the attacker has added, which the user won’t be able to see on the screen. As a result, people will connect to the phoney AP.

Read more…