Nuevo ataque AirSnitch elude el aislamiento de clientes Wi-Fi

Investigadores han presentado AirSnitch, una serie de ataques que socavan el aislamiento de clientes en redes Wi-Fi, permitiendo comunicación no autorizada entre dispositivos. La técnica explota comportamientos de bajo nivel en la red y afecta a routers de fabricantes principales como Netgear, D-Link y Cisco. Presentado en el Simposio de Seguridad de Redes y Sistemas Distribuidos 2026, los hallazgos destacan vulnerabilidades en entornos domésticos, de oficina y empresariales.

Las redes Wi-Fi, que conectan a más de 6.000 millones de usuarios en todo el mundo, dependen del aislamiento de clientes para impedir que los dispositivos se comuniquen directamente entre sí, incluso cuando están cifrados. Sin embargo, una nueva investigación demuestra que los ataques AirSnitch pueden eludir esta protección al dirigirse a las capas 1 y 2 de la pila de red, lo que provoca una desincronización de identidad entre capas cross-layer (cross-layer identity desynchronization, en inglés, se mantiene el término técnico en original si es estándar, pero traducido para fluidez: desincronización de identidad entre capas)).

Artículos relacionados

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Imagen generada por IA

Researchers discover SSHStalker botnet infecting Linux servers

Reportado por IA Imagen generada por IA

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

One week after the FCC banned sales of new foreign-made Wi-Fi routers over national security risks, new details emerge on implicated cyberattacks and growing criticism of the broad policy's effectiveness.

Reportado por IA

A hacking technique called DarkSword, used by Russian hackers, can compromise iPhones running iOS 18 simply by visiting infected websites. Discovered in the wild, this tool has been deployed in espionage and cybercriminal campaigns to target thousands of devices indiscriminately. It is now available online in a reusable form, risking a large portion of iPhone users worldwide.

New research from ETH Zurich and USI Lugano reveals vulnerabilities in popular password managers, challenging their assurances that servers cannot access user vaults. The study analyzed Bitwarden, Dashlane, and LastPass, identifying ways attackers with server control could steal or modify data, particularly when features like account recovery or sharing are enabled. Companies have begun patching the issues while defending their overall security practices.

Reportado por IA

Windscribe has introduced a new Android beta version of its VPN app featuring native support for AmneziaWG. This update aims to help users bypass deep packet inspection and counter internet censorship in countries like Iran and Russia. The launch addresses ongoing challenges faced by individuals seeking secure online access in restrictive environments.

Security researchers have uncovered critical vulnerabilities in the n8n automation tool. A previously released patch failed to fully address the issues, leaving users exposed. Experts provide guidance on protecting systems amid these discoveries.

Reportado por IA

A straightforward hack enabled the owner of a new DJI Romo robot vacuum to connect with thousands of other devices worldwide. The incident highlights an ongoing security vulnerability in the product. TechRadar reported the details on February 18, 2026.

 

 

 

Este sitio web utiliza cookies

Utilizamos cookies para análisis con el fin de mejorar nuestro sitio. Lee nuestra política de privacidad para más información.
Rechazar