BlueBorne Bluetooth Hijacker – What Do We Know?

Cybersecurity researchers at Armis Labs have released information about a new attack vector called BlueBorne.  This exploit has the potential to put millions of devices running Windows, Linux, Android or iOS operating systems at risk.

This exploit allows attackers to connect over the Bluetooth radio system with having to first pair the two Bluetooth enabled devices.  Once installed, the attacker has full control of the device, can download an install other apps or malware, conduct Man-in-the-Middle attacks, or turn thousands of phones into a botnet.  BlueBorne can jump from device to device via Bluetooth connections, and that makes this exploit highly contagious.

Your best defenses are:

  • Disable Bluetooth networking unless you are using it.  Then consider your environment.  Out in public?  Don’t turn on your Bluetooth.
  • Bluetooth only works over very short distances, usually 30 feet or less.  Your attacker needs to be close by to start this exploit.  But YOUR attacker may just be another infected victim, so see the previous item.
  • Install any operating system updates or patches for your devices.  Many manufacturers have already released updates.
  • Use a quality anti-malware program or app on your devices and keep it updated.

More information:


About the Author:

Cybersecurity analyst, pen-tester, trainer, and speaker. Owner of the WyzCo Group Inc. In addition to consulting on security products and services, Bob also conducts security audits, compliance audits, vulnerability assessments and penetration tests. Bob also teaches Cybersecurity Awareness Training classes. Bob works as an instruction for CompTIA’s non-profit IT-Ready Program in the Twin Cities. IT-Ready is a tuition free 8-week program designed to teach students of all ages the fundamentals of IT support to prepare them for an entry level position in Information Technology Support. Graduates of the classes take the exams to become CompTIA A+ certified. Bob is a frequent speaker at conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference2016, 2017, 2018, 2019, the (ISC)2 World Congress 2016, and the ISSA International Conference 2017, and many local community organizations, including Chambers of Commerce, SCORE, and several school districts. Bob has been blogging on cybersecurity since 2006 at

Add a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.