How do hackers use BlueBorne?

HoxL...oz8a
19 Mar 2023
20


BlueBorne is a highly contagious air attack vector that can easily be spread by air from one device to another, meaning that a single infected device can easily infect all devices.

The root cause of this infection is the use of Bluetooth technology in most devices today and because it is transmitted only through Bluetooth. And the presence of Bluetooth in all platforms makes it even more powerful. And once it infects a device, the attackers have complete control over that device. Because of this they misuse them, such as theft of data, many wrong things like ransom.

In this they can also install any ransomware and can commit many cyber crimes. It does not require internet for infection, only Bluetooth is enough for infection.

How to know if your device is affected by BlueBorne or not?
According to Armis, all major computational platforms are affected by BlueBorne in some way or another. But some versions of some operating systems are slightly more vulnerable than this.

Windows:-

All Windows desktops, laptops and tablets running Windows Vista or earlier operating systems are affected by the “Bluetooth Pineapple” vulnerability and that can protect an attacker from Man-in-the-middle Attack (CVE-2017-8628) Huh.

Linux:-

Any device in which the operating system is based on the Linux kernel (Version 3.3-rc1 and newer), the attacker can remotely run the vulnerability code (CVE-2017-1000251). Additionally, all Linux devices running BlueZ are affected by the information leak vulnerability (CVE-2017-1000250). Additionally, there are other devices vulnerable to the BlueBorne attack such as smartwatches, TVs and kitchen appliances running the open source Tixon OS.

IOS:-

All iPhone, iPad and iPod touch devices running iOS 9.3.5 or earlier versions are also affected by this remote code execution vulnerability. Similarly, all Apple TV devices running TV OS version 7.2.2 or lower are expected to be affected. Also, it is heard that all devices running iOS 10 are expected to be prote
Android:-

Android is considered to be the most affected by BlueBorne as it is more popular and has more number of users. According to Armis, all Android versions are vulnerable to BlueBorne, and four different vulnerabilities have been found that primarily affect the Android OS.

There are two similar vulnerabilities performing remote code execution (CVE-2017-0781 and CVE-2017-0782), a similar result is information leak (CVE-2017-0785) and the last vulnerability is Man-in-the-middle Attack ( CVE-2017-0783).

Not only are phones vulnerable to this, but also smartwatches, wearables based on Android Wear, TVs and set-top-boxes running Android TV, and many other devices that are Bluetooth enabled and with Android Wear. Use OS.

THANK YOUcted with BlueBorne.

Write & Read to Earn with BULB

Learn More

Enjoy this blog? Subscribe to RCB Lovers😍

0 Comments

B
No comments yet.
Most relevant comments are displayed, so some may have been filtered out.