Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,148,628 members, 7,801,816 topics. Date: Friday, 19 April 2024 at 12:18 AM

How The New Bluetooth Vulnerability Can Hack A Phone In 10 Seconds - Computers - Nairaland

Nairaland Forum / Science/Technology / Computers / How The New Bluetooth Vulnerability Can Hack A Phone In 10 Seconds (924 Views)

How Attackers Spy With New Bluetooth / Meet The $7000 Virus That Can Hack Your Bank Account. / How Do You Hack A Wi-fi Using Kali? (2) (3) (4)

(1) (Reply)

How The New Bluetooth Vulnerability Can Hack A Phone In 10 Seconds by melexchi(m): 11:32am On Sep 26, 2017
A Security company called Armis has found a collection of eight exploits,called BlueBorne, that can allow an hacker access to your phone without touching it. The hacker can have access to computers and phones, as well as IoT devices.

“Armis believes many more weakness await alltime discovery in the various platforms using Bluetooth. These weakness are fully operational, and can be successfully exploited, as demonstrated in our research. The BlueBorne attack vector can be used to conduct a large range of offenses, including remote code execution as well as Man-in-The-Middle hacking.

“BlueBorne affects pretty much every device we use. Turns that Bluetooth into a rotten black one. Don’t be surprised if you have to go see your security dentist on this one,” said (Ralph Echemendia, CEO of Seguru.)


The complex vector begins by finding a device to hack. This includes tasking the device to give up information about itself and then, ultimately, release keys and passwords “in an attack that very much resembles heartbleed,” the exploit that forced many web servers to display passwords and other keys remotely.

The next step is a set of code executions that allows for full control of the device. “This vulnerability resides in the Bluetooth Network Encapsulation Protocol (BNEP) service, which enables internet sharing over a Bluetooth connection (tethering). Due to a weakness in the BNEP service, a hacker can trigger a critical memory corruption, which is easy to exploit and enables him to run code on the device, effectively granting him total and absolute control over a device.

Finally, when the hacker has access they are able to begin streaming data from the device in a “man-in-the-middle” hacking. “The weakness resides in the PAN profile of the Bluetooth stack, and enables the attacker to create a malicious (malware) network interface on the victim’s device, re-configure IP routing and force the device to transmit all communication through the malicious network interface. This attack does not require any user interaction, authentication or pairing, making it practically invisible.”

Windows and iOS phones are protected and Google users are receiving a patch today. Other devices running older versions of Android and Linux could be easily attacked.

How do you stay safe? Keep all of your devices updated regularly and be carefull of older IoT devices. In most cases the problems associated with BlueBorne vectors should be patched by major players in the electronics space but less popular devices could still be prone to attack.

“New solutions are needed to scrap the new airborne attack vector, especially those that make air gapping irrelevant. Additionally, there will need to be more attention and research as new protocols are using for consumers and businesses alike. With the large number of desktop, mobile, and IoT devices only increasing, it is critical we can ensure these types of weakness are not exploited.
http://www.tag9ja.com/2017/09/how-new-bluetooth-vulnerability-can.html

(1) (Reply)

Why You Should Seriously Consider Covering Your Laptop Webcam Today / Omg Photoshop| See What A Nl Post On Youtube / Microsoft Surface Laptop Now Available For Sale With Preinstalled Windows 10 Pro

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 12
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.