https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

Security


Thinkstock

Image of Bluetooth headset

How to protect against Bluetooth attack vector BlueBorne

BlueBorne, a new Bluetooth attack vector, allows hackers to connect with Bluetooth-enabled devices without users’ assent or knowledge. Learn how it works and how users can protect against it.
  • Written by Jackie Roberson
  • 6th October 2017

Most device users know not to click on unfamiliar links or attachments in emails. Most know not to connect with discs or drives when their source is unknown or untrustworthy. Still, while they enjoy their devices in daily life, users tend to forget about dozens of features — especially Bluetooth.

Bluetooth connections have been available in mobile devices for several generations of technology, and most users hardly tinker with Bluetooth settings after turning it on. As a result, Bluetooth remains active and available almost always for those users — and now cybercriminals have discovered a way to take advantage of this near-ubiquitous device access.

A new vulnerability, dubbed BlueBorne, allows hackers to connect with Bluetooth-enabled devices without users’ assent or knowledge. Even worse, now that the Internet of Things has become so vast, malicious hackers can infiltrate networks using Bluetooth-capable devices that many users neglect to secure. To stay safe, it is vital that anyone with Bluetooth devices — which is to say nearly everyone — learn more about this emerging Bluetooth attack threat.

All about BlueBorne

BlueBorne isn’t malware the way most device users understand it, which is to say it isn’t a virus or worm that spreads from device to device. Rather, BlueBorne is an attack vector that doesn’t require users to click on links, disable security software or otherwise jump-start the cyberattack; instead, hackers can find their way into devices without notice through a weakness that is inherently present in Bluetooth tech. One infiltrated device can infect dozens of nearby devices within seconds if their Bluetooth capabilities are enabled — even if the devices aren’t in “discoverable” mode. BlueBorne is perhaps the most alarming of all attack vectors known because it can reach so-called -“air-gapped”- networks that lack connections to other networks, including the internet.

Security experts have identified at least eight zero-day vulnerabilities — or holes in security — that allow hackers in. These flaws exist across all operating systems, so even Apple evangelists aren’t safe. In fact, there are billions of devices around the world that could be impacted by this threat, specifically:

  • 2 billion Android devices
  • 2 billion Windows devices
  • 1 billion Apple devices
  • 8 billion IoT devices

Within these categories there are smartphones, laptops, entertainment systems, medical devices, household appliances, security cameras, wearable tech and so much more. Hackers who utilize BlueBorne and gain access to these devices essentially control their functions, so they can take illicit pictures, steal sensitive data, and generally make machines go haywire. Sometimes, cybercriminals will install additional malware on subverted devices, so even if the vulnerability is fixed, hackers will continue to have access to those devices.

What users can do

Nearly all devices are susceptible, but users suspicious of their devices can verify their vulnerability using this list:

  • All Windows devices (desktops, laptops and tablets) running Windows Vista and newer OS
  • Any device running Linux kernel version 3.3-rc1 and newer
  • All Linux devices (smartwatches, televisions and kitchen appliances) running BlueZ
  • All Apple devices (iPhone, iPad, and iPod Touch) running iOS 9.3.5 or earlier,
  • All AppleTV devices running tvOS 7.2.2 or earlier
  • All Android devices (smartphones, tablets, smartwatches, televisions, set-top boxes, in-car entertainment systems and more) running all Android versions

Fortunately, users who still aren’t certain can download apps from cybersecurity firms that investigate individual devices’ vulnerability to Bluetooth attack. Unfortunately, there isn’t a tried-and-true way to discover whether specific devices have already been infected by BlueBorne. However, if a Bluetooth-enabled device is acting strange in any way — turning on and off randomly, using applications without instruction, etc. — there is a good chance the device has been attacked in some way, possibly with BlueBorne.

[IoT Security Summit, co-located with Blockchain360 and Cloud Security Summit, explores how industry-wide security, privacy and trust can be established to unlock the full potential of IoT. Get your ticket now.]

As yet, there is no way to kick out a hacker once he or she has used BlueBorne to infiltrate a device, but there are a couple ways to increase device defenses before an attack is successful. Some developers have already released patches that close the holes in Bluetooth security. It is vital that device users download and install these patches as soon as they become available. Next, users should turn Bluetooth off — and make certain the feature is completely deactivated, not merely undiscoverable — when it isn’t in use. This may seem inconvenient, but true security is rarely without challenges.

The Bluetooth Special Interest Group has long been trying to bring Bluetooth security to the forefront, and now that this Bluetooth attack vector is public, it’s likely the group will get its wish. If only developers had listened before such a massive vulnerability put so many devices at risk.

Tags: Article Connected Health Care Security Strategy Technologies Vertical Industries

Related


  • UBTECH’s Mobile Disinfectant Robot Hits the Market
    The ADIBOT-A is launching across the U.S. to meet demand for autonomous cleaning regimes
  • IoT Security Firm to Acquire Medical Security Startup
    Claroty is set to acquire Medigate to grow its foothold in securing the Internet of Medical Things
  • Ransomware Attack Could Impact Paychecks
    The Kronos ransomware attack affected the company’s private cloud service over the weekend, knocking it offline just before the holidays
  • Image shows an abstract digital big data concept.
    BotenaGo Malware Targets Millions of IoT Devices
    AT&T Alien Labs identified the malware that has left millions of IoT devices exposed.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • UCLA Develops Human-Powered Medical Wearables
  • IoT Cyberattacks Escalate in 2021, According to Kaspersky
  • Water Authority Bolsters IoT Resilience With Cisco Cyber Vision
  • Malicious Attacks on IoT and Critical Infrastructure Gather Pace

Roundups

View all

IoT Product Roundup: PTC, Nokia, Arm and More

19th May 2022

IoT Deals, Partnerships Roundup: Intel, Nauto, Helium and more

14th May 2022

IoT Product Roundup: Amazon, Synaptics, Urban Control and More

27th April 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all
Dylan Kennedy of EMQ

Embedded IoT World 2022: Dylan Kennedy of EMQ

Dylan Kennedy, EMQ’s VP of global operations, sat down with Chuck Martin at Embedded IoT World 2022.

Embedded IoT World 2022: Omdia’s Sang Oh Talks Vehicle Chip Shortage

Omdia’s automotive semiconductor analyst sits down with Chuck Martin at this year’s event

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

Explore Emerging Tech For Enterprises at @TechXLR8 2022 this June ➡️ Join us from 1-3 June in harnessing the pow… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Clearview AI has been fined $9.4 million for collecting images of people from social media platforms to add to its… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Swiss-startup Airyacht is developing an eponymously named vehicle that it says will take the luxury-yacht experienc… twitter.com/i/web/status/1…

23rd May 2022
IoTWorldToday, IoTWorldSeries

@Tesla’s #Autopilot being investigated once again following fatal crash in Newport Beach, California. iotworldtoday.com/2022/05/23/tes…

23rd May 2022
IoTWorldToday, IoTWorldSeries

A new Kansas law will enable #driverless deliveries from @Walmart and its partner @Gatik_AI. #AVs… twitter.com/i/web/status/1…

23rd May 2022
IoTWorldToday, IoTWorldSeries

Access a world of opportunity in 2022 with @IoTWorldToday ➡️ Now is time to unlock ROI, by accessing a global com… twitter.com/i/web/status/1…

23rd May 2022
IoTWorldToday, IoTWorldSeries

3D Home Printer to Build 72 Residences for National Homebuilder dlvr.it/SQhWSF https://t.co/XJOs70DqzH

19th May 2022
IoTWorldToday, IoTWorldSeries

Microsoft Ramping up Cybersecurity Service Offerings dlvr.it/SQhPR0 https://t.co/nYzaDRnyVY

19th May 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X