Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New AI-Powered Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy

New AI-Powered Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy

Posted on July 24, 2025July 24, 2025 By CWS

WhoFi surfaced final on the general public repository ArXiv, gorgeous safety groups with a proof-of-concept that turns atypical 2.4 GHz routers into covert biometric scanners.

Not like camera-based programs, this neural pipeline fingerprints the distinctive means a physique distorts Wi-Fi channel state data (CSI), letting an attacker establish somebody from the alternative facet of a plaster wall, in darkness, or by means of gentle foliage.

Early reverse-engineering reveals it wants solely a single-antenna transmitter and a three-antenna receiver—{hardware} discovered in lots of mid-range client entry factors—making large-scale deployment trivially cheap.

Researchers initially framed WhoFi as a privacy-preserving different to CCTV, however its publication instantly triggered red-team curiosity.

Inside forty-eight hours, underground boards circulated turnkey Docker pictures embedding the complete PyTorch mannequin and a light-weight CSI sniffer powered by the open-source NexMon firmware.

The safety analysts (Danilo Avola, Daniele Pannone, Dario Montagnini, and Emad Emam) famous that the repositories already embrace scripts for automated goal enrollment: a would-be spy merely walks a corridor with a smartphone, captures 100 Wi-Fi packets per particular person, and the transformer encoder—reportedly reaching 95.5% Rank-1 precision—learns a radio “fingerprint” that continues to be steady even when the topic modifications garments or carries a backpack.

From a network-intrusion standpoint, probably the most alarming vector is that the malware by no means touches the endpoint.

All computation runs on an attacker-controlled field collocated with the entry level; packet captures movement over a mirrored port, invisible to host-based EDR.

No JavaScript beacons, no phishing payloads—simply passive RF assortment. A single hidden SSID named “radar” is broadcast to maintain the modulation parameters fixed, however victims’ units needn’t affiliate.

Detection-Evasion through In-Batch Detrimental Studying

As soon as exfiltrated CSI slices attain the GPU, WhoFi executes a persistence tactic few defenses monitor: model-level re-training. The code frequently fine-tunes embeddings utilizing an in-batch damaging loss that forces recent signatures to break down towards their historic centroid whereas repelling others.

As a result of retraining alters solely weights inside ~/fashions/whofi.ckpt, no new binaries hit disk, evading integrity screens.

# whofi_persist.py — mannequin self-refresh loop
batch_q, batch_g = sampler.subsequent() # passive CSI queue
S_q, S_g = mannequin(batch_q), mannequin(batch_g) # embed signatures
sim = torch.mm(S_q, S_g.T) # cosine (l2-normed)
loss = F.cross_entropy(sim, torch.arange(sim.dimension(0)))
loss.backward(); optimizer. Step() # silent in-place replace

Safety controls that depend on static hashes or periodic reminiscence snapshots miss this mutation; each epoch subtly reshapes the hypersphere with out spawning a brand new course of.

Analysts can as a substitute hunt for anomalous GPU kernels invoked by libtorch_cuda.so on in any other case headless Wi-Fi controllers or look ahead to persistent 20 MB-per-minute CSI site visitors surges on change mirror ports.

Encoder Structure (Supply – Arxiv)

The Encoder Structure depicts the light-weight six-head transformer that fuels this stealth.

Till firmware distributors expose CSI entry solely to signed drivers—and till SOCs study to flag sustained raw-802.11 captures—WhoFi represents a disquieting leap in non-invasive surveillance, putting radio-frequency biometrics squarely within the attacker’s toolkit.

Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:Accuracy, AIPowered, Biometrics, Humans, Tracks, Walls, WhoFi, WiFi

Post navigation

Previous Post: GRC Firm Vanta Raises $150 Million at $4.15 Billion Valuation
Next Post: New York Seeking Public Opinion on Water Systems Cyber Regulations

Related Posts

NailaoLocker Ransomware Attacking Windows Systems Using Chinese SM2 Cryptographic Standard NailaoLocker Ransomware Attacking Windows Systems Using Chinese SM2 Cryptographic Standard Cyber Security News
Windows Authentication Coercion Attacks Pose Significant Threats to Enterprise Networks Windows Authentication Coercion Attacks Pose Significant Threats to Enterprise Networks Cyber Security News
Massive Cyberattack Targets Trusted Platforms with Malware Massive Cyberattack Targets Trusted Platforms with Malware Cyber Security News
Critical Dolby Codec Vulnerability Exposes Android Devices to Code Execution Attacks Critical Dolby Codec Vulnerability Exposes Android Devices to Code Execution Attacks Cyber Security News
ThreatBook Peer-Recognized as a Strong Performer in the 2025 Gartner® Peer Insights™ Voice of the Customer for Network Detection and Response — for the Third Consecutive Year ThreatBook Peer-Recognized as a Strong Performer in the 2025 Gartner® Peer Insights™ Voice of the Customer for Network Detection and Response — for the Third Consecutive Year Cyber Security News
LLMs Tools Like GPT-3.5-Turbo and GPT-4 Fuels the Development of Fully Autonomous Malware LLMs Tools Like GPT-3.5-Turbo and GPT-4 Fuels the Development of Fully Autonomous Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News