BlueBorne Bluetooth Hijacker – What Do We Know?

Cybersecurity researchers at Armis Labs have released information about a new attack vector called BlueBorne.  This exploit has the potential to put millions of devices running Windows, Linux, Android or iOS operating systems at risk.

This exploit allows attackers to connect over the Bluetooth radio system with having to first pair the two Bluetooth enabled devices.  Once installed, the attacker has full control of the device, can download an install other apps or malware, conduct Man-in-the-Middle attacks, or turn thousands of phones into a botnet.  BlueBorne can jump from device to device via Bluetooth connections, and that makes this exploit highly contagious.

Your best defenses are:

  • Disable Bluetooth networking unless you are using it.  Then consider your environment.  Out in public?  Don’t turn on your Bluetooth.
  • Bluetooth only works over very short distances, usually 30 feet or less.  Your attacker needs to be close by to start this exploit.  But YOUR attacker may just be another infected victim, so see the previous item.
  • Install any operating system updates or patches for your devices.  Many manufacturers have already released updates.
  • Use a quality anti-malware program or app on your devices and keep it updated.

More information:

0

About the Author:

Cybersecurity guru to business owners in the St Paul, Minneapolis, and western Wisconsin area. Computer security and hacking have been a passion of mine since I entered the computer and networking business in 2000. In 2013 I completed a course of study and certification exam to become a Certified Ethical Hacker (CEH). In 2016 I was certified as a Certified Information Systems Security Professional (CISSP). As Senior Cybersecurity Engineer at Computer Integration Technologies, I help our clients experience high levels of computer security, network security, and web site security. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also provide Cybersecurity Awareness Training for clients and their employees. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. The views expressed on this Web site are mine alone and do not necessarily represent the views of my employer.

Add a Comment