Security researchers from Armis have discovered a new Bluetooth vulnerability that could probably expose billions of devices to remote attack. They called the attack “BlueBorne“.
The attack doesn’t need device victims to click on any links, connect to a rogue Bluetooth device, or take any other step. The exploit process is generally so quickly, needing no more than 10 seconds to perform, and it runs even when the targeted machine is already connected to another Bluetooth-enabled device.
According to the Armis Labs:
Armis Labs revealed a new attack vector endangering major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux, and the devices using them. The new vector is dubbed “BlueBorne”, as it spreads via the air and attacks devices via Bluetooth. BlueBorne allows attackers to take control of devices, access corporate data and networks, penetrate secure “air-gapped” networks, and spread malware to other devices. “
The attack does not need the targeted machine to be set on discoverable mode or to be paired to the attacker’s device. In addition, the targeted user is not asked to authorize or authenticate the connection to the attacker’s device.
The easiest way to protect yourself is to turn Bluetooth off, but since mobiles are still vulnerable when they are connected to a Bluetooth device, the only suggestion is not to use Bluetooth at all. Also, you can check if the device is vulnerable or not by downloading the BlueBorne Android App from the play store.
Latest posts by Unallocated Author (see all)
- Hacks, Scams & Attacks on the Blockchain - May 31, 2018
- Why Is Penetration Testing Essential For Modern Business? - May 31, 2018
- Framework Created To Stop Cyber-Attacks On Internet-Connected Cars - May 30, 2018