Home Cyber Attack Tracking Mobile Devices by Analyzing Bluetooth Transmissions

Tracking Mobile Devices by Analyzing Bluetooth Transmissions

by Abeerah Hashim
Bluetooth devices tracking

Despite security measures in place, researchers have found how to analyze and exploit Bluetooth transmissions for tracking mobile devices. Although the methodology has some limitations, it still poses a significant threat to users.

Mobile Devices Tracking Via Bluetooth Transmissions

Researchers from UC San Diego have shared a detailed research paper about tracking mobile devices by analyzing Bluetooth transmissions.

In brief, the technique works on the analysis of the beacons that devices mobile devices transmit when using the Bluetooth Low Energy (BLE) protocol.

Although, it always remains technically possible to track these beacons since the devices continuously transmit them for communication with available recipient devices when needed. However, the devices implement various measures to prevent such unsolicited Bluetooth tracking, like re-encrypting MAC addresses.

Nonetheless, the researchers have now elaborated on bypassing the security measures to stalk the beacons.

The process basically involves fingerprinting the unique physical layer to identify target devices. This fingerprinting remains unaffected even if the MAC address resets.

Regarding how the attack executes, the researchers explain,

First the attacker must isolate the target to capture a fingerprint of its wireless transmissions. Then it must find features that uniquely identify the target, namely the unique physical-layer features of the device’s BLE transmitter hardware. Then, the attacker sets up a receiver in the location where they want to see if the transmitter is there and passively sniffs for the target’s BLE transmissions. They will know when the target device is near the receiver when it captures one or more packets that matches the target’s physical layer fingerprint.

Once fingerprinted successfully, the adversary can then stalk the victim whenever accessible, particularly when the target device transmits more frequently.

All it takes for an adversary to execute this attack is bearing a Software Defined Radio sniffer that can record g raw I/Q radio signals.

Attack Limitations And Countermeasures

Despite being easy, the method also has some limitations that make it a presently impractical threat in a real-world scenario.

For instance, temperature changes can impact device metrics to cause changes in the fingerprint. Likewise, two or more devices may exhibit similar fingerprints, thereby alleviating the uniqueness for device identification. Similarly, tracking the target device becomes difficult if the device has a low transmit power.

As for countermeasures, the researchers explain that applying fixes at the software level isn’t enough since the method makes use of hardware.

Nonetheless, a simple workaround can come into action if the device workload keeps on changing with the MAC address. Such workload fluctuations will also trigger changes in battery consumption and the device temperature. However, constantly high temperatures may damage the battery life.

Another proposed countermeasure is redesigning the BLE chipset signal chain by “adding random time-varying extra frequency offset the crystal oscillator.”

The researchers have shared the code for this project on GitHub for all to review.

Let us know your thoughts in the comments.

You may also like

Latest Hacking News

Privacy Preference Center

Necessary

The __cfduid cookie is used to identify individual clients behind a shared IP address and apply security settings on a per-client basis.

cookie_notice_accepted and gdpr[allowed_cookies] are used to identify the choices made from the user regarding cookie consent.

For example, if a visitor is in a coffee shop where there may be several infected machines, but the specific visitor's machine is trusted (for example, because they completed a challenge within your Challenge Passage period), the cookie allows Cloudflare to identify that client and not challenge them again. It does not correspond to any user ID in your web application, and does not store any personally identifiable information.

__cfduid, cookie_notice_accepted, gdpr[allowed_cookies]

Advertising

DoubleClick by Google refers to the DoubleClick Digital Marketing platform which is a separate division within Google. This is Google’s most advanced advertising tools set, which includes five interconnected platform components.

DoubleClick Campaign Manager: the ad-serving platform, called an Ad Server, that delivers ads to your customers and measures all online advertising, even across screens and channels.

DoubleClick Bid Manager – the programmatic bidding platform for bidding on high-quality ad inventory from more than 47 ad marketplaces including Google Display Network.

DoubleClick Ad Exchange: the world’s largest ad marketplace for purchasing display, video, mobile, Search and even Facebook inventory.

DoubleClick Search: is more powerful than AdWords and used for purchasing search ads across Google, Yahoo, and Bing.

DoubleClick Creative Solutions: for designing, delivering and measuring rich media (video) ads, interactive and expandable ads.

doubleclick

Analytics

The _ga is asssociated with Google Universal Analytics - which is a significant update to Google's more commonly used analytics service. This cookie is used to distinguish unique users by assigning a randomly generated number as a client identifier. It is included in each page request in a site and used to calculate visitor, session and campaign data for the sites analytics reports. By default it is set to expire after 2 years, although this is customisable by website owners.

The _gat global object is used to create and retrieve tracker objects, from which all other methods are invoked. Therefore the methods in this list should be run only off a tracker object created using the _gat global variable. All other methods should be called using the _gaq global object for asynchronous tracking.

_gid works as a user navigates between web pages, they can use the gtag.js tagging library to record information about the page the user has seen (for example, the page's URL) in Google Analytics. The gtag.js tagging library uses HTTP Cookies to "remember" the user's previous interactions with the web pages.

_ga, _gat, _gid