Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Researchers: Wi-Fi Probe Requests Expose User Data

A group of academic researchers from the University of Hamburg in Germany has discovered that mobile devices leak identifying information about their owners via Wi-Fi probe requests.

Mobile devices use these probe requests to receive information about nearby Wi-Fi access points and establish connections to them when a probe response is received.

A group of academic researchers from the University of Hamburg in Germany has discovered that mobile devices leak identifying information about their owners via Wi-Fi probe requests.

Mobile devices use these probe requests to receive information about nearby Wi-Fi access points and establish connections to them when a probe response is received.

Attackers that can sniff network traffic, the academics say, can use these probe requests to track and identify devices, and even pinpoint their location.

According to them, roughly a quarter of probe requests contain the Service Set Identifier (SSIDs) of networks the devices were previously connected to, which could be used to reveal home addresses or visited locations.

Furthermore, the probe requests can be used to “trilaterate the location of a device with an accuracy of up to 1.5 meters,” or to follow the movement of a device to essentially track their owner, the researchers note.

“This is in fact employed in 23% of the stores already. Companies and cities that conduct Wi-Fi tracking take the legal position that only the MAC address contained in probe requests is considered personal data according to GDPR Article 4(1), which protects personal data from unlawful collection and processing,” the researchers said in their paper.

The academics claim that evidence collected during a November 2021 experiment focused on the analysis of probe requests should be enough to consider these requests personal data, based on SSIDs stored in the devices’ preferred network lists (PNLs) alone.

As part of the experiment, the researchers went to a German city’s pedestrian area and recorded probe requests over a period of one hour, three times, using six off-the-shelf antennae. Of the 252,242 total requests recorded, 23.2% contained SSIDs.

Advertisement. Scroll to continue reading.

The researchers also discovered that some of the transmitted probe requests containing SSIDs also leaked password information, and that roughly 20% of the transmitted SSIDs were likely typos of the actual SSID.

The analysis of the probe requests also revealed 106 distinct first and/or last names, three email addresses, the SSIDs of 92 distinct holiday homes or accommodations, and the name of a local hospital.

The academics say they ran all SSIDs through WiGLE’s geolocation lookup API, which helped them pinpoint the location of the actual networks to an approximate 1-kilometer radius.

“Considering the wealth of personal and sensitive information we observed in SSID fields, they can constitute identifying information and thus require due consideration,” the researchers point out. “We argue that at least for as long as there are still devices broadcasting SSIDs, probe requests should be considered personal data and not be used for monitoring without legal basis.”

Related: Serious Vulnerabilities Found in Wi-Fi Module Designed for Critical Industrial Applications

Related: Researcher Explains Wi-Fi Password Cracking at Scale

Related: Researchers Abuse Apple’s Find My Network for Data Upload

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.