A research group from the University of California, Irvine has presented a new attack called AirSnitch that compromises data privacy in secured Wi-Fi networks. The attack, details of which were disclosed in October 2023, allows an attacker to determine which specific devices are on the network and which websites they are visiting, bypassing standard WPA2 and WPA3 encryption. This does not require cracking the password but instead involves analyzing side-channel radio signals emitted by the router during data transmission.

The vulnerability challenges the fundamental perception of Wi-Fi security. For decades, users and companies have relied on WPA protocol encryption, believing it reliably hides internet traffic content from outsiders. AirSnitch demonstrates that even with strong encryption, metadata—the fact of device activity and the nature of transmitted data—can be revealed through analysis of the physical radio channel. This is particularly alarming for corporate and home networks where guest segments are often used to isolate visitors.

Technically, AirSnitch is a side-channel attack. It exploits the fact that when transmitting each bit of data, a Wi-Fi router slightly changes its radio signal power. These changes are unique to different bit sequences. An attacker positioned nearby with an antenna and an SDR receiver (software-defined radio) costing a few hundred dollars can record these signal "fingerprints." By comparing them with a pre-collected database of patterns corresponding to visits to specific websites or use of applications, the attacker can determine the victim's activity with high accuracy. A key feature is that the attack works even if the victim's device is connected to an encrypted guest network isolated from the main one.

The discovery has raised serious concern in the cybersecurity community. Experts note that such side-channel attacks are difficult to eliminate with software patches because they exploit the physical properties of the equipment. Network equipment manufacturers, including major vendors, have not yet provided official comments regarding possible mitigation measures. The researchers, in turn, have already notified the Wi-Fi Alliance of the found vulnerability, initiating the responsible disclosure process.

For the industry, this is a signal to reconsider security approaches at the physical level. Wireless communication standards developers may need to consider masking the data transmission "radio fingerprint" in future specifications. For ordinary users and corporate network administrators, the threat is more targeted—the attack requires close proximity and preparation, but it is realistic for spying on a specific individual or organization. Current recommendations are limited: be aware of the risk of metadata leakage even in encrypted networks and, if possible, use a VPN that encrypts traffic before it is transmitted over Wi-Fi, masking the patterns.

The prospects for eliminating the vulnerability are unclear. A complete fix may require changes in the hardware design of Wi-Fi chips, which could take years. In the short term, monitoring tools for detecting such radio espionage can be expected. The research also raises open questions about the security of other wireless standards, such as Wi-Fi 6E and the future Wi-Fi 7, which use new frequency bands. The scientists' work is a reminder that in the era of ubiquitous encryption, attacks are shifting to the area where the digital world meets analog physics.