The issue of Coronavirus is news in the world, but not only human life is at constant risk of viruses or health threats. Electronic devices also suffer from attacks and can be exposed to infiltrations that end up causing many problems.

If we talk about Kr00k, surely you will not know what it is, they may be initials that little and nothing tells us at first glance, but what is true is that you are causing serious havoc in the cell phone industry.

Kr00k is a virus that was reported by ESET headquarters in Slovakia and is a derivation (or evolution) of KRACK (Key Reinstallation Attacks) attacks that violate the WPA2 protocol.

This means that it takes advantage of entering through the data packets that circulate through the Wi-Fi connection, which allows to steal and decrypt everything that is sent from a device based on WPA2 networks.

Although it does not attack 100% of the devices, vulnerability has been reported mainly to older cell phones, which use the popular Broadcom or Cypress Wi-Fi chips.

Here is the list of the most recurring models in the attack, so you can consider if you are in danger:

Apple iPad mini 2

Apple iPhone 6

Apple iPhone 6S

Apple iPhone 8

Apple iPhone XR

Raspberry Pi 3

Samsung Galaxy S4

Samsung Galaxy S8

Xiaomi Redmi 3S

Amazon Echo 2da generación

Amazon Kindle 8va generación

Apple MacBook Air Retina 13″ 2018

Google Nexus 5

Google Nexus 6

Google Nexus 6S

Cisco working on solutions

The good news, however, is that Cisco is working on Kr0ok and hopes to find solutions soon to avoid more infections or new collateral problems caused by Kr00k, all this because they are also users of Broadcom chips and several of their products are affected due to this. .

“Several Cisco wireless products are affected by this vulnerability. Cisco will release software updates that address this vulnerability. There are no solutions to address this vulnerability, “said the firm.

The brand that did give more details of how the contagion with this dangerous virus was taking place.

“When a decoupling event is triggered, an affected device will remove the user configured PTK as part of a sequence of cleanup operations. A series of wifi frames still stored in the hardware output queue could be transmitted while encrypting with a weak and static PTK, ”he explained. There are two ways to purchase encrypted wifi frames with static PTK:

Trigger the decoupling event by injecting malicious packets into the wireless network and capturing frames sent after the event.

Passively listening to wireless network traffic and capturing frames sent after a decoupling event.

It is very important that we consider the risks that technological advances can also cause, since it is no secret to anyone that malicious people will seek to improve their chances of committing crimes through technology in the same way.

It is important to consider how our connections, and especially business networks that carry a double responsibility for handling sensitive information and that can be of great value to virtual criminals, are always protected or at least with the most serious security considerations to avoid facing problems. security, or at least reduce them to the maximum.

Fiber Optic networks, for example, offer in a special way a higher level of security that is not provided with conventional connections. Also if a business-type connection is made exclusively, 1: 1 international will have greater results in terms of of protection for the own information or of the same clients of our companies.