The WPA3 security standard makes WiFi access points more secure, protecting passwords from offline dictionary attacks. However, researchers have devised a clever man-in-the-middle attack that tricks users into entering their password when reconnecting.
You lose your WiFi connection. When trying to reconnect, you’re asked to enter the password. If you do, you’re compromised.
Researchers from the University of the West Indies spawned a rouge WPA3 access point and used the captive portal (a login page similar to those at hotels, airports, or companies) to capture user credentials.