What Is BlueBorne? BlueBorne is an attack vector by which hackers can leverage Bluetooth connections to penetrate and take complete control over targeted devices. BlueBorne affects ordinary computers, mobile phones, and the expanding realm of IoT devices. The attack does not require the targeted device to be paired to the attacker’s device, or even to be set on discoverable mode. Armis Labs has identified eight zero-day vulnerabilities so far, which indicate the existence and potential of the attack vector. Armis believes many more vulnerabilities await discovery in the various platforms using Bluetooth. These vulnerabilities are fully operational, and can be successfully exploited, as demonstrated in our research. The BlueBorne attack vector can be used to conduct a large range of offenses, including remote code execution as well as Man-in-The-Middle attacks. Additional Information: Download our Technical White Paper on BlueBorne What Is The Risk? The BlueBorne attack vector has several qualities which can have a devastating effect when combined. By spreading through the air, BlueBorne targets the weakest spot in the networks’ defense – and the only one that no security measure protects. Spreading from device to device through the air also makes BlueBorne highly infectious. Moreover, since the Bluetooth process has high privileges on all operating systems, exploiting it provides virtually full control over the device. Unfortunately, this set of capabilities is extremely desireable to a hacker. BlueBorne can serve any malicious objective, such as cyber espionage, data theft, ransomware, and even creating large botnets out of IoT devices like the Mirai Botnet or mobile devices as with the recent WireX Botnet. The BlueBorne attack vector surpasses the capabilities of most attack vectors by penetrating secure “air-gapped” networks which are disconnected from any other network, including the internet. In the past, most Bluetooth vulnerabilities and security flaws originated in issues with the protocol itself, which were resolved in version 2.1 in 2007. Nearly all vulnerabilities found since were of low severity, and did not allow remote code execution. This transition occurred as the research community turned its eyes elsewhere, and did not scrutinize the implementations of the Bluetooth protocol in the different platforms, as it did with other major protocols. https://youtu.be/Az-l90RCns8 https://youtu.be/LLNtZKpL0P8 Bluetooth is a difficult protocol to implement, which makes it prone to two kinds of vulnerabilities. On the one hand, vendors are likely to follow the protocol’s implementation guidelines word-for-word, which means that when a vulnerability is found in one platform it might affect others. These mirrored vulnerabilities happened with CVE-2017-8628 and CVE-2017-0783 (Windows & Android MiTM) which are “identical twins”. On the other hand, in some areas the Bluetooth specifications leave too much room for interpretation, causing fragmented methods of implementation in the various platforms, making each of them more likely to contain a vulnerability of its own. This is why the vulnerabilities which comprise BlueBorne are based on the various implementations of the Bluetooth protocol, and are more prevalent and severe than those of recent years. We are concerned that the vulnerabilities we found are only the tip of the iceberg, and that the distinct implementations of the protocol on other platforms may contain additional vulnerabilities.
author | zahidsun |
---|---|
permlink | man-in-middle-attack-next-generation-bluetooth-vulnerabilities-in-hacking |
category | hacking |
json_metadata | {"tags":["hacking"],"image":["https://img.youtube.com/vi/Az-l90RCns8/0.jpg"],"links":["https://youtu.be/Az-l90RCns8"],"app":"steemit/0.1","format":"markdown"} |
created | 2017-10-07 13:54:27 |
last_update | 2017-10-07 13:54:27 |
depth | 0 |
children | 3 |
last_payout | 2017-10-14 13:54:27 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 3,513 |
author_reputation | 58,170,628,473,644 |
root_title | "man in middle attack Next generation Bluetooth vulnerabilities in Hacking" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 17,011,257 |
net_rshares | 4,316,088,876 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
cheetah | 0 | 742,985,644 | 0.5% | ||
steemitboard | 0 | 179,461,810 | 1% | ||
tokenteller | 0 | 102,914,572 | 1% | ||
clickme09 | 0 | 598,170,926 | 100% | ||
amitraj | 0 | 319,161,154 | 100% | ||
zahidsun | 0 | 150,876,149 | 100% | ||
knight.riderr09 | 0 | 226,314,181 | 100% | ||
dasvikas | 0 | 232,116,926 | 100% | ||
arunavabiswas | 0 | 87,043,838 | 100% | ||
btceshuu12 | 0 | 162,481,829 | 100% | ||
jassimkm | 0 | 232,116,893 | 100% | ||
nayeemamn | 0 | 249,525,659 | 100% | ||
shivpremi | 0 | 377,189,844 | 100% | ||
mirmudasir | 0 | 156,678,847 | 100% | ||
yusuf781 | 0 | 394,598,392 | 100% | ||
desitv | 0 | 104,452,212 | 100% |
Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://www.armis.com/blueborne/
author | cheetah |
---|---|
permlink | cheetah-re-zahidsunman-in-middle-attack-next-generation-bluetooth-vulnerabilities-in-hacking |
category | hacking |
json_metadata | "" |
created | 2017-10-07 13:54:45 |
last_update | 2017-10-07 13:54:45 |
depth | 1 |
children | 0 |
last_payout | 2017-10-14 13:54:45 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 131 |
author_reputation | 942,693,160,055,713 |
root_title | "man in middle attack Next generation Bluetooth vulnerabilities in Hacking" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 17,011,279 |
net_rshares | 0 |
Congratulations @zahidsun! You have completed some achievement on Steemit and have been rewarded with new badge(s) : [](http://steemitboard.com/@zahidsun) Award for the number of posts published Click on any badge to view your own Board of Honor on SteemitBoard. For more information about SteemitBoard, click [here](https://steemit.com/@steemitboard) If you no longer want to receive notifications, reply to this comment with the word `STOP` > By upvoting this notification, you can help all Steemit users. Learn how [here](https://steemit.com/steemitboard/@steemitboard/http-i-cubeupload-com-7ciqeo-png)!
author | steemitboard |
---|---|
permlink | steemitboard-notify-zahidsun-20171007t171132000z |
category | hacking |
json_metadata | {"image":["https://steemitboard.com/img/notifications.png"]} |
created | 2017-10-07 17:11:30 |
last_update | 2017-10-07 17:11:30 |
depth | 1 |
children | 0 |
last_payout | 2017-10-14 17:11:30 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 694 |
author_reputation | 38,975,615,169,260 |
root_title | "man in middle attack Next generation Bluetooth vulnerabilities in Hacking" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 17,028,363 |
net_rshares | 0 |
Congratulations @zahidsun! You have completed some achievement on Steemit and have been rewarded with new badge(s) : [](http://steemitboard.com/@zahidsun) Award for the number of upvotes received Click on any badge to view your own Board of Honor on SteemitBoard. For more information about SteemitBoard, click [here](https://steemit.com/@steemitboard) If you no longer want to receive notifications, reply to this comment with the word `STOP` > By upvoting this notification, you can help all Steemit users. Learn how [here](https://steemit.com/steemitboard/@steemitboard/http-i-cubeupload-com-7ciqeo-png)!
author | steemitboard |
---|---|
permlink | steemitboard-notify-zahidsun-20171007t213405000z |
category | hacking |
json_metadata | {"image":["https://steemitboard.com/img/notifications.png"]} |
created | 2017-10-07 21:34:03 |
last_update | 2017-10-07 21:34:03 |
depth | 1 |
children | 0 |
last_payout | 2017-10-14 21:34:03 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 695 |
author_reputation | 38,975,615,169,260 |
root_title | "man in middle attack Next generation Bluetooth vulnerabilities in Hacking" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 17,046,507 |
net_rshares | 0 |