Discovering more vulnerabilities makes Bluetooth devices vulnerable to malicious attacks
Bluetooth is a connection technology that has been around for a long time and is probably no stranger to each of us. Bluetooth connectivity makes it easy to transfer files, photos, and documents between technology devices, as well as to connect and exchange data between a main device and peripherals over a certain distance.
But besides the undisputed convenience, this connectivity technology has inadvertently increased data privacy and privacy issues on an individual level.
Hackers can easily take advantage of existing vulnerabilities in the Bluetooth protocol to deploy many different infringement activities. Security researchers from Ohio State University in the United States recently found an additional basic design flaw in the connection between Bluetooth devices that makes them more vulnerable to hacking.
Specifically, this vulnerability is determined to exist in the way Bluetooth enabled devices communicate with mobile applications controlling them. Essentially, a Bluetooth enabled device (such as a smart speaker, Bluetooth headset) will communicate with the mobile device that manages it (such as a phone) through a unique identifier that is called UUID. This identifier is used by mobile devices to identify other devices and establish connections, and is also embedded in mobile phone codes, and hackers will take advantage of this to carry out attacks. work.
In an unencrypted or unencrypted connection field, an attacker will be able to interfere with your Bluetooth connection and collect data, or at least be able to identify Bluetooth devices clearly. You are using, all based on UUID code.
To test how the flaw affects Bluetooth devices under usage conditions, the team built a hack device that can identify Bluetooth devices connected to mobile phones. Dynamic message based on malicious messages. Test results show that the problem lies in the connection between the original device and the phone. The risk is greatly reduced if the initial authentication is made more secure, and this can be overcome thanks to the Bluetooth device management application updates.
According to statistics, there are currently about 18,000 applications that could be affected by this security hole in the Google Play store. Application developers should do more to ensure user safety.
You should read it
- The 'Bluetooth 4.2' technology standard was released
- What is Bluetooth 5.0? What benefits does it have for our lives?
- Face some new hacking techniques related to Bluetooth technology
- Desktop without Bluetooth? This is the solution
- Detection of security vulnerabilities affects all Bluetooth versions
- Learn about Bluetooth technology
- iPhone and Android smartphone series stick with serious Bluetooth security error
- Instructions for using Bluetooth on devices
May be interested
- Analyze DLL hijacking attacksin this article, i will show you the vulnerabilities in software architectures that could be vulnerable to dll hijacking, how to detect applications with vulnerabilities and how to prevent them.
- Android operating system is the top target of hackers99% of mobile attacks are targeted at android but many devices running this operating system are not updated to the latest version to fix the error.
- What is Bluetooth? Useful information about Bluetooth technologymany devices today incorporate bluetooth technology to enable wireless communication with other bluetooth devices. before using bluetooth, it is important to understand what this technology is and the security risks that may come with it, as well as how to avoid or protect yourself from these risks.
- WordPress plugins with more than 300,000 pages that use vulnerabilities are vulnerable to SQL Injection attacksthe sql injection attack capability was found on one of wordpress's most popular plugins, currently installed on more than 300,000 websites. hackers can exploit to steal databases and hijack remote sites.
- How to find lost Bluetooth devicesbluetooth devices with more and more compact designs mean they are also easier to lose
- A new security flaw allowed to impersonate Bluetooth peripheralsa new security hole of bluetooth peripherals could be exploited to connect to malicious devices.
- How to set up and manage Bluetooth devices in Windowsmany pc users have switched to bluetooth mice and keyboards, not to mention wireless bluetooth headsets. luckily, windows supports the latest bluetooth 5.4 technology, making it easier than ever to enable bluetooth in windows.
- Learn about Bluetooth technologytoday, many devices are tightly coupled with bluetooth technology to enable wireless communication with other bluetooth devices. before using bluetooth, we should find out what this technology is and the security risks that may occur with it, as well as measures to avoid or protect you from these risks.
- Millions of Macs have been updated and can still be hacked via the EFI firmwarebut even if you tried to update all the software for your device, it is still possible that your computer is outdated and vulnerable.
- Microsoft patched a critical vulnerability in Windowsyesterday microsoft patched three vulnerabilities in windows, one of which could be exploited by attacks that trick users into accessing malicious websites.