A new Nozomi Networks report has found that 94 per cent of Wi-Fi networks lack proper protection against deauthentication attacks, leaving them vulnerable to disruption and infiltration.

The analysis of 500,000+ wireless networks revealed that only 6 per cent had enabled Management Frame Protection (MFP), a key security feature preventing attackers from forcing devices offline using spoofed deauthentication frames. These denial-of-service (DoS) attacks can disrupt connectivity and serve as a gateway for data theft and system intrusions.

Deauthentication attacks exploit weaknesses in Wi-Fi protocols, allowing hackers to disconnect devices, intercept data, and launch man-in-the-middle attacks. Nozomi warns that state-linked hacking groups, such as Volt Typhoon, have used these tactics to target critical infrastructure, healthcare, and industrial networks.

To mitigate risk, businesses should enable 802.11w (MFP), upgrade to WPA3 encryption, and monitor networks for suspicious activity. Regular wireless security audits and strong segmentation are also essential to prevent attackers from exploiting these vulnerabilities.