Researchers found a new Bluetooth bug that allows hackers to impersonate a trusted device

Spread the love

Billions of Bluetooth devices are affected

In brief: A newly-discovered flaw in the Bluetooth protocol makes it possible for hackers to fool your mobile devices into connecting to a new device by mimicking a previously trusted device. While this likely affects most Bluetooth devices you might own, manufacturers only need to make relatively small changes to mitigate the risks.

Researchers at École Polytechnique Fédérale de Lausanne have published details about a new Bluetooth vulnerability that affects billions of mobile devices and wearables and allows a clever attacker to pose as a remotely paired device.

The attack method, dubbed Bluetooth Impersonation Attacks or (BIAS), is related to Bluetooth Classic which supports two types of wireless data transfer between devices: Basic Rate (BR) and Enhanced Data Rate (EDR).

The academics explain “the Bluetooth specification contains vulnerabilities enabling to perform impersonation attacks during secure connection establishment. […] Such vulnerabilities include the lack of mandatory mutual authentication, overly permissive role switching, and an authentication procedure downgrade.”

On a more positive note, for BIAS to be a viable option the attacker must bring their device within range of yours. Then, to perform the technique they have to eavesdrop a BR or EDR connection between your device and another, say your bluetooth headphones, and find out their address.

The vulnerability allows hackers to use that information to impersonate either a slave or a master device, meaning they can both read information from the target device or transmit data to it. And this is achieved by mimicking a previously trusted device and claiming to support only unilateral authentication, which is the lowest level of Bluetooth security.

Researchers note that these attacks can be combined with others such as KNOB, and they can be easily performed using low-cost equipment such as a Raspberry Pi. In their paper, they evaluated a total of 30 unique Bluetooth devices equipped with 28 different Bluetooth chips, which include several models of smartphones from Apple, Nokia, Samsung, and Google, as well as laptops from HP and Lenovo.

RECOMMENDED READ:  Razer is making face masks free to all Singapore residents via vending machine

In light of the findings, Bluetooth SIG introduced a number of changes to the Bluetooth core specification “to clarify when role switches are permitted, to require mutual authentication in legacy authentication and to recommend checks for encryption-type to avoid a downgrade of secure connections to legacy encryption.”

 176 Interactions,  4 today

READ ALSO:
Reserve currency: Stephen Harper on why Bitcoin could be in reserve alternatives to the U.S. dollar

According to Stephen Harper, Bitcoin may be part of a basket of reserve alternatives to the US dollar. Stephen Harper, Read more

Burger Bitcoin or crypto crap: Kevin O’Leary of Shark Tank on why he’s no investing in BTC

Despite criticising Bitcoin, the Shark Tank Star has said that the digital currency could become "something of tremendous value" if Read more

Is Bitcoin Burst to $400,000 in the Works? Luke Martin Analyzes Wall Street Veteran’s Massive BTC Price Prediction

Popular trader and crypto analyst Luke Martin is analyzing a massive Bitcoin price prediction from a veteran Wall Street fund Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Contact Us

%d bloggers like this: