Bluetooth Attack

Critical Bluetooth Attack allowing Hackers To Control Your Device

Critical Bluetooth Attack allowing Hackers To Control Your Device

Security researchers have just discovered total zero-day vulnerabilities in Bluetooth protocol that affect Android, iOS, Windows and Linux to the Internet of things (IoT) devices—using the short-range wireless communication technology.

If you are using a Bluetooth enabled device, be it a smartphone, laptop, smart TV or any other IoT device, you are at risk of malware attacks that can carry out remotely to take over your device even without requiring any interaction from your side.

Security researchers at IoT security firm Armis have devised an attack, dubbed “BlueBorne“, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man-in-the-middle” connection to gain access to devices’ critical data and networks without requiring any victim interaction.

All an attacker need is for the victim’s device to have Bluetooth turned on and obviously, in close proximity to the attacker’s device. Moreover, successful exploitation doesn’t even require vulnerable devices to be paired with the attacker’s device.

Blueborne – Android Take Over Demo

What’s more worrisome is that the BlueBorne attack could spread like the wormable WannaCry ransomware that emerged earlier this year and wrecked havoc by disrupting large companies and organizations worldwide.

Ben Seri, head of research team at Armis Labs, claims that during an experiment in the lab, his team was able to create a botnet network and install ransomware using the BlueBorne attack.