March 13, 2017 By Larry Loeb 2 min read

An increased interest in improved mobile user privacy with Wi-Fi networks grew the adoption of Media Access Control (MAC) address randomization. By using a device-created MAC, network transport could be done without a static link to the user being broadcast over the network. The hope was that the user remained anonymous while the networks got their needed MAC.

Future Changes to MAC Needed

The standard is still being worked on by the Institute of Electrical and Electronics Engineers (IEEE), who began testing on the technology in 2014. Apple supported the idea in iOS 8, but dropped support in the most recent iOS 10. Android has made an attempt to support it since 2014 and the Android 6. However, the IEEE may want to go back to the drawing board.

Bleeping Computer recently noted that researchers at the U.S. Naval Academy found a new method to detect individual mobile devices, even if the MAC addresses have gone though a randomization. They revealed the method in their paper, “A Study of MAC Address Randomization in Mobile Devices and When It Fails,” which was published March 8.

Exposing the MAC Address Standard

In the paper, researchers pointed to an unknown flaw that affected the actual hardware of mobile chipsets. It was discovered when they observed a problem in how the chipsets handle low-level control frames: Specific packets were sent by the chipsets when they performed a specific request. These control frames allowed a global MAC to be determined and identified.

This control frame behavior increases the accuracy of identification to 100 percent. That would be impressive in its own right, but it is especially significant when compared to the 50 percent accuracy achieved in a similar 2016 attack. That was chronicled in the report, “Why MAC Address Randomization Is Not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms.”

Researchers from the Naval Academy wrote that the attack worked for all known devices, regardless of the OS, manufacturer, device type or randomization scheme. To make matters worse, they found that Android devices can be susceptible even when the user disabled Wi-Fi or enabled Airplane Mode.

Ramping Up Security

With this attack exposure, researchers proposed a major effort to save the standard practice. For starters, they state that standardized randomization needs to be implemented correctly on any device using Wi-Fi. Additionally, it should use the entire length of the MAC field as randomization input.

This is just the beginning of several proposed recommendations. However, it’s a tall order to get device manufacturers to implement proper randomization techniques while also getting all the manufacturers to act in a consistent manner.

More from

Cyberattack on American Water: A warning to critical infrastructure

3 min read - American Water, the largest publicly traded United States water and wastewater utility, recently experienced a cybersecurity incident that forced the company to disconnect key systems, including its customer billing platform. As the company’s investigation continues, there are growing concerns about the vulnerabilities that persist in the water sector, which has increasingly become a target for cyberattacks. The breach is a stark reminder of the critical infrastructure risks that have long plagued the industry. While the water utility has confirmed that…

What’s behind unchecked CVE proliferation, and what to do about it

4 min read - The volume of Common Vulnerabilities and Exposures (CVEs) has reached staggering levels, placing immense pressure on organizations' cyber defenses. According to SecurityScorecard, there were 29,000 vulnerabilities recorded in 2023, and by mid-2024, nearly 27,500 had already been identified.Meanwhile, Coalition's 2024 Cyber Threat Index forecasts that the total number of CVEs for 2024 will hit 34,888—a 25% increase compared to the previous year. This upward trend presents a significant challenge for organizations trying to manage vulnerabilities and mitigate potential exploits.What’s behind…

Quishing: A growing threat hiding in plain sight

4 min read - Our mobile devices go everywhere we go, and we can use them for almost anything. For businesses, the accessibility of mobile devices has also made it easier to create more interactive ways to introduce new products and services while improving user experiences across different industries. Quick-response (QR) codes are a good example of this in action and help mobile devices quickly navigate to web pages or install new software by simply scanning an image.However, legitimate organizations aren’t the only ones…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today