Some people say that:
Bluetooth technology is dying out!
You don't have to believe them.
Because there are billions of Bluetooth-enabled devices in the world that use this technology. Even though Wi-Fi has replaced our need for Bluetooth to transfer files, people still use Bluetooth with their headsets, ear-buds, speakers, and other devices.
But I am sure that not many of you have heard much about the cybersecurity risks or challenges poised by Bluetooth...
You don’t want any unauthorized parties to access to your Bluetooth-enabled devices, nor do you want them to have access to the data you’re transferring via Bluetooth. Right?
-
Bluetooth was invented in 1989, but really came into use during the 2000s. There is no one Bluetooth protocol; it is a collection of different protocols grouped together under a single specification. Bluetooth is managed by the Bluetooth Special Interest Group, known as Bluetooth SIG.
Over time, Bluetooth has become synonymous with multiple consumer markets, first in audio and entertainment; then phones, tablets, and PCs; followed by automotive; and later the connected device market.
Hackers often use a Bluetooth connection to spread malicious files and viruses. This means that users' personal information is at risk every time they use a Bluetooth device. The best way to reduce the risk is to turn Bluetooth off. But let's face it -- that's not really an option.
There are major cyber risks associated with Bluetooth and many of these issues are arising out of the sheer complexity of Bluetooth itself. Bluetooth may give you the impression of being a very simple thing, but it is not. In fact, it is more complex than the Wi-Fi.
The risks of Bluetooth security—and potential rewards for malicious hackers, are only growing as Bluetooth spreads from being used largely in consumer settings, like smart home devices and wearables, to being adopted more and more by enterprises and governments for large-scale deployment in corporate offices, hospitals, and industrial control environments.
-
Complexity of Bluetooth and BTLE
Bluetooth offers so many options for deployment that developers don't necessarily have full mastery of the available choices, which can result in faulty implementations.
One major reason Bluetooth is involved in so many cybersecurity cases is just how complex this protocol (or better say a suite of protocols) is.
Famous researcher Ben Seri made the following remarks--
"When you look at the Bluetooth standard it’s like 3,000 pages long—if you compare that to other wireless protocols like Wi-Fi, for example, Bluetooth is like 10 times longer. The Bluetooth SIG tried to do something very comprehensive that fits to many various needs, but the complexity means it’s really hard to know how you should use it if you’re a manufacturer."
The standard often describes a topic in a scattered way. And it often leaves the complex interactions of the protocol to the manufacturers, which is another source of vulnerability.
Even the Bluetooth SIG, itself is aware of the challenge and importance of training the developers to get a handle on Bluetooth's massive scope. The Bluetooth documentation is so extensive because the protocol doesn't only define a radio frequency layer for Bluetooth, but also it has components at every layer of tech, from hardware up through applications, to guarantee interoperability between Bluetooth devices.
Bluetooth isn't just wireless audio streaming anymore. There's low power data transfer, mesh network; it’s a very broadened scope. But security is obviously very important. That's why, the standard offers operational modes for everything from no security all the way up to 128 AES encryption or 'secure connections only' mode. They've put into it as much as the community has asked for.
It has almost everything you need, but most of the details are buried in hundreds of pages of unreadable specifications.
We can say at least one thing to people and manufacturer that please use the maximum level of security your product can support.
-
The Most Common Types of Bluetooth Attacks
1. BlueSmacking
If you know DoS attack, then you know it. In Denial of Service attack, your device or server receives too many data packets or oversized data-packets than it is designed to handle. Your device or server will get overwhelmed and be closed down. Simple...
BlueSmacking is nothing but a DoS attack on your Bluetooth enabled device. This attack basically uses the L2CAP layer of Bluetooth’s networking stack to send a really oversized data packet.
2. BlueJacking
BlueJacking happens when one Bluetooth device hijacks another with spam advertising. Bluetooth usually has a broadcasting range of 10-meters or about 30-feet. So your BlueJacking attacker would probably be in the same room as you. Or perhaps an attacker could leave a BlueJacking device on the street and target your phone while you walk past it. This attack is more of an annoyance than an attack.
But these attacks may get serious when phone messages planted are a means of phishing attacks. Phishing is when an attacker pretends to be a trusted entity like your bank, phone company, or Amazon to entice you into clicking on a link or entering your sensitive information.
A message sent by BlueJacking could contain a hyperlink to a website that has malware, or a website that grabs sensitive information from its victim.
3. BlueSnarfing
It’s similar to BlueJacking in some ways, but much more dangerous. You see, a BlueJacking attack just sends data, whereas a BlueSnarfing attack can take your data. Your data that is dangerous in the hands of cyber attackers, such as your text messages, emails, photos, Whatsapp chats, and other unique identifying information that your phone or laptop uses with your cellular provider or ISP.
Things really get serious when an attacker can receive enough information about your phone or laptop, because it will allow them to conduct more harmful cyber attacks.
4. BlueBugging
When hackers in the wild realized that how easy BlueJacking and BlueSnarfing can be, they eventually went ahead and wrote an exploit, now known as BlueBugging. They were able to use BlueTooth to establish a BACKDOOR on a victim's phone or laptop. And you would know that these Backdoors are very dangerous because they can give a malicious outsider inside access to your device and sensitive information. They can spy on you 24x7. They may even be able to pretend to be you on social media or your online banking!
5. Blueborne
Blueborne is perhaps the most dangerous attack. It refers to an attack vector that invades your devices via Bluetooth. It can recognize the vulnerabilities in your device and use them against you. What makes Blueborne so dangerous is the fact that this method does not require the two devices to be paired together. Attackers can even target the devices that are not set in 'visible' mode.
New machine learning tools have helped them learn to penetrate security more easily than ever. They are then able to take complete control over your devices and access any data stored within. Hackers often use the devices that they control to execute larger attacks.
The order of magnitude can be stunning: The BlueBorne flaw that was first disclosed in September 2017, and it impacted 5 billion PCs, phones, and IoT units.
Read it again, 5-Billion devices!!!!
-
How to Reduce Bluetooth Security Risks?
#1 Turn Off When Not In Use
#2 Keep Your Devices Up to Date
#3 Pair Trusted Devices Only
#4 Use a VPN. If you must use Bluetooth to transfer your income tax forms from your phone to your PC or whatever, at the very least you should encrypt your files first.
#5 Only leave your Bluetooth in “discoverable” mode when you’re pairing a new peripheral with your phone or laptop. When you always use the same earbuds or whichever peripheral, you don’t need to have discoverable mode on because your device will already know the peripheral’s unique identifying code.
-
As a cybersecurity professional, you should always be watchful of risks and dangers posed by the Bluetooth devices in your network infrastructure...
-
Please let me know of what do you think about this in the comment section. You can also share with all if the information shared here helps you in some manner.
Kindly write your comment on the posts or topics, because when you do that you help me greatly in designing new quality article/post on cybersecurity.
This Article Was Written & published by Meena R, Senior Manager - IT, at Luminis Consulting Services Pvt. Ltd, India.
Over the past 16 years, Meena has built a following of IT professionals, particularly in Cybersecurity, Cisco Technologies, and Networking...
She is so obsessed with Cybersecurity domain that she is going out of her way and sharing hugely valuable posts and writings about Cybersecurity on website, and social media platforms.
30,000+ professionals are following her on Facebook and mesmerized by the quality of content of her posts on Facebook.
If you haven't yet been touched by her enthusiastic work of sharing quality info about Cybersecurity, then you can follow her on Facebook:
Click Here to follow her: Cybersecurity PRISM