Are we safe from phone-to-phone-spreading BlueBorne malware horror case?

While reading through the technical whitepaper of the BlueBorne attacks I’ve noted that it is required for the attacker to know my Bluetooth MAC-Address.
They claim it should be really easy to obtain it by using one of the following techniques:

  1. Sniff Wifi traffic and get the unencrypted MAC from the raw wifi frames (for example by using this device)
  2. Sniff Bluetooth traffic, for example while I use it with headphones (for example by using the mentioned Ubertooth)

Both of these things are easy to do as long as you have the special hardware.

However if one infects my phone and wants it to infect a third device, how can my phone sniff the required MAC-address of the third device?

Most phones have no special sniffing hardware nether for Bluethooth[1] nor Wifi[2] so it is hard to get the third device MAC, which is required for the attack. The only way I can think of getting MACs would be to guess/brute-force them?

So, are we then “safe” from phone-to-phone-spreading malware horror case?


[1] “Since the “Monitor Mode” of Bluetooth is very limited in tools widely accessible for researchers, […]” http://go.armis.com/hubfs/BlueBorne%20Technical%20White%20Paper-1.pdf

[2] “It is not possible to capture from the internal Wi-Fi interface on Android without running a custom firmware and gaining root access.” https://www.kismetwireless.net/android-pcap/

Continue reading Are we safe from phone-to-phone-spreading BlueBorne malware horror case?

Are we safe from phone-to-phone-spreading BlueBorne malware horror case?

While reading through the technical whitepaper of the BlueBorne attacks I’ve noted that it is required for the attacker to know my Bluetooth MAC-Address.
They claim it should be really easy to obtain it by using one of the following techniques:

  1. Sniff Wifi traffic and get the unencrypted MAC from the raw wifi frames, assuming the attacker is not connected to the WIFI I am (for example by using this device)
  2. Sniff Bluetooth traffic, for example while I use it with headphones (for example by using the mentioned Ubertooth)

Both of these things are easy to do as long as you have the special hardware.

However if one infects my phone and wants it to infect a third device, how can my phone sniff the required MAC-address of the third device?

Most phones have no special sniffing hardware nether for Bluethooth[1] nor Wifi[2] so it is hard to get the third device MAC, which is required for the attack. The only way I can think of getting MACs would be to guess/brute-force them?

So, are we then “safe” from phone-to-phone-spreading malware horror case?


[1] “Since the “Monitor Mode” of Bluetooth is very limited in tools widely accessible for researchers, […]” http://go.armis.com/hubfs/BlueBorne%20Technical%20White%20Paper-1.pdf

[2] “It is not possible to capture from the internal Wi-Fi interface on Android without running a custom firmware and gaining root access.” https://www.kismetwireless.net/android-pcap/

Continue reading Are we safe from phone-to-phone-spreading BlueBorne malware horror case?

VU#240311: Multiple Bluetooth implementation vulnerabilities affect many devices

A collection of Bluetooth implementation vulnerabilities known as"BlueBorne"has been released. These vulnerabilities collectively affect Windows,iOS,and Linux-kernel-based operating systems including Android and Tizen,and may in worst case allow an unauthenticated attacker to perform commands on the device. Continue reading VU#240311: Multiple Bluetooth implementation vulnerabilities affect many devices

Microsoft Patches .NET Zero Day Vulnerability in September Update

Microsoft fixes 25 critical vulnerabilities including one zero day under attack and one tied to the high-profile BlueBorne attack vector. Continue reading Microsoft Patches .NET Zero Day Vulnerability in September Update

BlueBorne: Critical Bluetooth Attack Puts Billions of Devices at Risk of Hacking

If you are using a Bluetooth enabled device, be it a smartphone, laptop, smart TV or any other IoT device, you are at risk of malware attacks that can carry out remotely to take over your device even without requiring any interaction from your side.

Security researchers have just discovered total 8 zero-day vulnerabilities in Bluetooth protocol that impact more than 5.3 Billion devices—from

Continue reading BlueBorne: Critical Bluetooth Attack Puts Billions of Devices at Risk of Hacking

BlueBorne: The latest Bluetooth vulnerability that impacts billions of devices

A series of major Bluetooth-related security flaws allows attackers to take over devices, spy on data and networks, spread malware and successfully hack even airgapped targets. Victims don’t need to click on links, download malicious files or even be connected to the internet to be impacted. Billions of devices, including smartphones, connected TVs, laptops and watches are impacted. At least two billion such Android and Linux devices are deemed “unpatchable” and will remain vulnerable, according to researchers at Armis, the Israeli security firm where the issue was discovered in early 2017. The weakness is being called “BlueBorne” because it impacts nearly all devices with Bluetooth capabilities.  Google, Microsoft and Linux are expected to release patches and announcements on Tuesday to address and secure devices against BlueBorne. For Apple users, the issue has been fixed since iOS 10’s release in Sept. 2016. BlueBorne constitutes eight zero-day vulnerabilities, four of which are deemed critical. Beyond Tuesday, […]

The post BlueBorne: The latest Bluetooth vulnerability that impacts billions of devices appeared first on Cyberscoop.

Continue reading BlueBorne: The latest Bluetooth vulnerability that impacts billions of devices

Wireless ‘BlueBorne’ Attacks Target Billions of Bluetooth Devices

Bluetooth attack vector, dubbed ‘BlueBorne’, leaves billions of smart Bluetooth devices open to attack including Android and Apple phones and millions more Linux-based smart devices. Continue reading Wireless ‘BlueBorne’ Attacks Target Billions of Bluetooth Devices