Hackers Now Use Bluetooth to Penetrate Secured Device
Every Bluetooth device is at risk of hackers penetrating through their mobile firewalls. An article by TechSpot states that Bluetooth discovered a bug in its system. Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen have published a short journal about Bluetooth and this specific bug.
The World-Famous Wireless Connection: Bluetooth
Bluetooth is a mobile/desktop application that provides a wireless connection to Bluetooth-based devices. Devices are connected through a wireless connection using safe verification processes and encryption keys that are distinct to each device.
First, two devices are paired to establish a connection between them. Encryption keys are used to authenticate the connection between the two devices. Once the two devices are paired, they can automatically connect with each other whenever both devices are in range of each other.
A Pesky Bug
According to the journal made by Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen, this bug will affect billions of mobile devices. This, in turn, allows mobile devices to be open to vulnerability. Moreover, this Bluetooth bug allows hackers to pose as trusted devices when connecting to a Bluetooth device.
Personal information and confidential work activities and documents may be leaked out to these hackers because of this Bluetooth bug. This specific method of hacking is called Bluetooth Impersonation Attacks (BIAS). This method is linked to Bluetooth Classic.
Basic Rate (BR) and Enhanced Data Rate (EDR) are two types of wireless data transfer processes between mobile and desktop devices. Bluetooth Classic utilizes both. The Bluetooth bug, as experts say, contains vulnerabilities in which hackers impersonating as trusted devices can connect to another person's device.
Some notable vulnerabilities are insufficient mutual verification, lenient role switching, and downgraded verification processes. There are disadvantages for hackers when using the Bluetooth Impersonation Attack method.
The hacker must be in range with the targeted person's mobile/desktop device. Moreover, the hacker must be able to successfully connect through either a BR or EDR connection of his/her device to the targeted person's mobile/desktop device and discover their address.
However, when the process of a Bluetooth Impersonation Attack is successful, the hacker will then be able to find personal information from the targeted person's mobile/desktop device or extract personal data from it. Moreover, the targeted person will not even notice that someone is hacking into his/her mobile/desktop device
This is because the hackers impersonate themselves as trusted devices that they have connected to in the past. The Bluetooth Impersonation Attack method can be used together with the Key Negotiation of Bluetooth (or KNOB) method, as experts say.
The Key Negotiation of Bluetooth method allows any hacker to weaken the encryption keys in pairing Bluetooth devices. After the encryption keys are weakened, the hacker will then be able to control a mobile/desktop device completely. Thus, the Bluetooth Special Interest Group (or Bluetooth SIG) will be administering changes to Bluetooth activities.
Additionally, despite all this, teams that aid in the fixing of Bluetooth malfunctions will only be creating small changes to eliminate the risk of hackers.
[Video] Free Cybersecurity Lessons For Kids Locked At Home Made Available By The Government As Virtual Users Rise Amid Coronavirus Quarantine
If your kids have nothing better to do, then this Cyber game will teach them the skills and knowledge for cybersecurity while being fun and entertaining!
Security Breach: Facebook Falls Victim To Hacker Gaining Access To And Selling Private Information of More Than 267 Million Social Media Users In The Black Market for $600
Facebook users at risk of having their personal information used against them as hackers sell off more than 267 million users' data on the dark web for $600
[WARNING ] Android's Latest Update May Cause System Failure: Multiple Smartphones Already Reported Broken
Android's latest update was revealed to have specific problems and may be harmful to your phone. Several phones have already reported damages.
Hackers Who Work For the Government: From Outlaw to Hero
There have been many hackers who turned out to work for the government where their skill was finally recognized, and here are a few of them.
This Bluethooth-enabled App Will Let You Know If You’ve Been in Contact with COVID-19 Patients
The government has previously urging scientists to make an application for tracking down the people that the COVID-19 patient has been in contact with. Good news, it has now been resolved!
MORE IN ITECHPOST
Xbox Series X? Why Didn't Microsoft Just Call it Xbox Series PC?
The Xbox Series X is coming up soon but a recent blog post explains how it's more similar to a PC than the usual Xbox.
Benefits of LED Grow Lights for Your Indoor Plants
There has been a surge in the number of growers cultivating indoor crops. Some turn to indoor farming in areas like cities, where there are almost no green spaces. Growing indoors takes advantage of otherwise wasted space and makes it possible for anyone to create an indoor garden.
How To Get Borderlands: The Handsome Collection For Free And Beginner Tips To Prepare Yourself
Epic Games has made Borderlands: The Handsome Collection free for a limited time. Here's how to get it for yourself and how to be prepared when you play the games in the collection!