March 13, 2017 By Larry Loeb 2 min read

An increased interest in improved mobile user privacy with Wi-Fi networks grew the adoption of Media Access Control (MAC) address randomization. By using a device-created MAC, network transport could be done without a static link to the user being broadcast over the network. The hope was that the user remained anonymous while the networks got their needed MAC.

Future Changes to MAC Needed

The standard is still being worked on by the Institute of Electrical and Electronics Engineers (IEEE), who began testing on the technology in 2014. Apple supported the idea in iOS 8, but dropped support in the most recent iOS 10. Android has made an attempt to support it since 2014 and the Android 6. However, the IEEE may want to go back to the drawing board.

Bleeping Computer recently noted that researchers at the U.S. Naval Academy found a new method to detect individual mobile devices, even if the MAC addresses have gone though a randomization. They revealed the method in their paper, “A Study of MAC Address Randomization in Mobile Devices and When It Fails,” which was published March 8.

Exposing the MAC Address Standard

In the paper, researchers pointed to an unknown flaw that affected the actual hardware of mobile chipsets. It was discovered when they observed a problem in how the chipsets handle low-level control frames: Specific packets were sent by the chipsets when they performed a specific request. These control frames allowed a global MAC to be determined and identified.

This control frame behavior increases the accuracy of identification to 100 percent. That would be impressive in its own right, but it is especially significant when compared to the 50 percent accuracy achieved in a similar 2016 attack. That was chronicled in the report, “Why MAC Address Randomization Is Not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms.”

Researchers from the Naval Academy wrote that the attack worked for all known devices, regardless of the OS, manufacturer, device type or randomization scheme. To make matters worse, they found that Android devices can be susceptible even when the user disabled Wi-Fi or enabled Airplane Mode.

Ramping Up Security

With this attack exposure, researchers proposed a major effort to save the standard practice. For starters, they state that standardized randomization needs to be implemented correctly on any device using Wi-Fi. Additionally, it should use the entire length of the MAC field as randomization input.

This is just the beginning of several proposed recommendations. However, it’s a tall order to get device manufacturers to implement proper randomization techniques while also getting all the manufacturers to act in a consistent manner.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today