Bluetooth Vulnerabilities and Attacks
(OBJ 2.3, 2.5, & 4.1)
Bluetooth
- Wireless technology for short-distance data exchange without the need for an Internet connection
- It's commonly used for connecting devices but presents security challenges
- Vulnerabilities include
- Insecure pairing
- Occurs when Bluetooth devices establish a connection without proper authentication
- Occurs because some bluetooth devices do not require any authentication at all and other still will employ weaker authentication methods
- Device spoofing
- Occurs when an attacker impersonates a device to trick a user into connecting
- Mimics device name to trick a user into connecting to it
- On-path attacks
- Exploits Bluetooth protocol vulnerabilities to intercept and alter communications between devices without either party being aware
- Insecure pairing
Different Types of Bluetooth Attacks
- Bluejacking
- Sending unsolicited messages to a Bluetooth device
- Often used for pranks or testing vulnerabilities without causing any serious harm
- Bluesnarfing
- Unauthorized access to a device to steal information like contacts, call logs, and text messages
- Bluebugging
- Allows attackers to take control of a device's Bluetooth functions
- Can make calls, send messages, or access the internet
- Bluesmack
- Denial-of-service attack by overwhelming a device with data, causing it to crash or become unresponsive
- BlueBorne
- Spreads through the air to infect devices without user interaction
Best Practices for Secure Bluetooth Usage
- Turn off Bluetooth when not in use
- Reduces the attack surface and exposure to threats
- Set devices to "non-discoverable" mode by default
- Prevents unsolicited connection attempts
- Regularly update firmware
- Ensures security is up-to-date with patches for known vulnerabilities
- Only pair with known and trusted devices
- Mitigates the risk of connecting to malicious devices
- Use a unique PIN or passkey during pairing
- Adds security during the pairing process to ensure that unauthorized devices cannot easily connect to your device.
- Be cautious of unsolicited connection requests
- Avoid accepting requests blindly
- Example:
- Random users trying to AirDrop pictures to you
- Images could actually contain malware embedded with them
- Use encryption for sensitive data transfers
- Scrambles data to prevent unauthorized access
- Even if intercepted, the data will remain unreadable to any unauthorized parties who are eavesdropping in on our Bluetooth connections.