What is Blueborne Attack? | HackThatCORE

Blueborne Attack | HackThatCORE

What is Blueborne Attack? | HackThatCORE


Blueborne Attack

Image Source: Digital Riser


Today, we are all using at least one Bluetooth enabled device, be it a smartphone, laptop, smart TV or any other IoT device. We are at risk of malware attacks that can carry out remotely to take over our device even without requiring any interaction from our side.
Cybersecurity experts have just discovered 8 zero-day vulnerabilities in Bluetooth protocol that can impact more than 5.3 Billion devices—from Android, iOS, Windows and Linux to the Internet of things (IoT) devices—using the short-range wireless communication technology i.e, Bluetooth.
Using these vulnerabilities, cybersecurity Experts at IoT security firm Armis have devised an attack, dubbed BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a "man-in-the-middle" connection to gain access to devices' critical data and networks without requiring any victim interaction.
All an attacker need is for the victim's device to have Bluetooth turned on and obviously, in close proximity to the attacker's device as bluetooth technology is short range. Successful exploitation to Blueborne attack doesn't even require vulnerable devices to be paired with the attacker's device.


What is this actually, Blueborne.

The most worst thing to think about is that the BlueBorne attack could spread like the wormable WannaCry ransomware that emerged earlier previous year and disrupted large companies and organisations worldwide.
Using the Blue borne attack, we can create the botnet and install the ransomeware without so much extra effort, which can increase the chances of devices to be exploited in front of Blueborne.
However, it is difficult for even a skilled Hacker to create a universal wormable exploit that could find Bluetooth-enabled devices, target all the platforms (including Android, Windows, Linux, iOS) together and spread automatically from one infected device to others.

What are precautions that can prevent Blueborne Attack?

The cybersecurity researchers responsibly listed out all the 8 vulnerabilities to all the major affected companies a few months ago—including Google, Apple and Microsoft, Samsung and Linux Foundation.
These serious vulnerabilities include:

  • Information Leak Vulnerability in Android (CVE-2017-0785)
  • Remote Code Execution Vulnerability (CVE-2017-0781) in Android's Bluetooth Network Encapsulation Protocol (BNEP) service
  • Remote Code Execution Vulnerability (CVE-2017-0782) in Android BNEP's Personal Area Networking (PAN) profile
  • The Bluetooth Pineapple in Android—Logical flaw (CVE-2017-0783)
  • Linux kernel Remote Code Execution vulnerability (CVE-2017-1000251)
  • Linux Bluetooth stack (BlueZ) information leak vulnerability (CVE-2017-1000250)
  • The Bluetooth Pineapple in Windows—Logical flaw (CVE-2017-8628)
  • Apple Low Energy Audio Protocol Remote Code Execution vulnerability (CVE Pending)

Google and Microsoft have already made security patches available to their customers, while Apple iOS devices running the most recent version of its mobile operating system (that is 10.x) are safe.
What can be worst?
All Apple iOS devices with versions 9.3.4 or older and over 1.25 Billion active Android devices running older than Android Marshmallow (6.x) are seriously vulnerable to the BlueBorne attack.
Besides this, millions of smart Bluetooth enabled devices running different versions of Linux are also vulnerable to the Blueborne. Also Linux platforms like Tizen OS, BlueZ and 3.3-rc1 are also vulnerable to at least one of the BlueBorne bugs.

That's all as an introduction of Blue borne attack. If you want to learn more about this attack then you can visit our YouTube Channel or can search on this website about hackme or can visit our complete hacking training website mrhackershacking

Comments

Popular Posts