Bluetooth Vulnerability: BlueBorne
The number of smart, connected devices on the rise, so concerns about online privacy and security, especially with the spate of ransomware and other malware attacks dominating the headlines over the past year.
Earlier this month Armis security has identified a new vulnerability in computers and mobile devices. The exploit, dubbed “BlueBorne (an attack vector by which hackers can leverage Bluetooth connections to penetrate and take complete control over targeted devices).
How it Works
The BlueBorne attack vector has several stages. First, the attacker locates active Bluetooth connections around him or her.
Devices can be identified even if they are not set to “discoverable” mode. Next, the attacker obtains the device’s MAC address, which is a unique identifier of that specific device.
By probing the device, the attacker can determine which operating system his victim is using, and adjust his exploit accordingly.
The attacker will then exploit a vulnerability in the implementation of the Bluetooth protocol in the relevant platform.
How to protect yourself
Disable Bluetooth on all your devices. Consider buying a New Device with a patch for that Blueborne Fix or probably wait until this gets fixed in mainstream Android.
Recently Samsung Galaxy S8 and S8 Plus have received a new update which is targeted to fix the Blueborne issue.