BlueBorne Exploit: Everything You Need To Know

BlueBorne concerns us because of the medium by which it operates. Unlike the majority of attacks today, which rely on the internet, a BlueBorne attack spreads through the air.

Airborne attacks, unfortunately, provide a number of opportunities for the attackers.

Spreading through the air renders the attack much more contagious and allows it to spread with minimum effort.

Armis Labs revealed this new attack vector Called “Blueborne”. The exploit can manipulate within a Bluetooth range of your laptop, phone, car, or anything else that runs including Android, iOS, Windows, and Linux.

It simply gains control over the device without any action from the user.

What Is BlueBorne?

  • BlueBorne is an attack vector by which hackers can leverage Bluetooth connections to take complete control over targeted devices.
  • BlueBorne affects ordinary computers, mobile phones
  • The attack does not require the targeted device to be paired to the attacker’s device or even to be set on discoverable mode.
  • The scary part is what happens after the connection is made.
  • An attacker can act as the logged in user.

BlueBorne Explained:

Preventive Measures:

Armis contacted to the major companies like Google, Microsoft, Apple, Samsung and Linux regarding this security issue and they all responded well to this issue.

Microsoft issued security patches to all supported Windows versions on July 11, 2017

Google has issued a security update patch and notified its partners. It was available to Android partners on August 7th, 2017 and Android users should verify that they have September 9, 2017, Security Patch Level.

Linux pushed patches to the upstream projects in addition to resolve those vulnerabilities.

In Apple iOS 10 this vulnerability is no more.

Facts:

Google’s Android is widespread across the third-party manufacturers and they might not patch out the vulnerability in time. Google released protective patches for Nougat (7.0) and Marshmallow (6.0) as a result of its September security update.

Bluetooth’s short range means an attacker has to be near you to use the Blueborne exploit.

If you see the screen turn on, therefore, you should look and see why. This is the biggest “flaw” in the exploit and It will turn your screen on if someone tries to do anything while connected.

Conclusion:

At the end, we are strongly recommending you to Shut Bluetooth off while you’re not using it and don’t leave your phone unattended.

NEXT |Apple A11 Bionic Chip: The Genesis

Sarajit Das

Share
Published by
Sarajit Das

Recent Posts

Apple Event 2022: Have A Look At List And Specifications Of All The Launches

Apple Event 2022: Apple with its first event of the year has brought in a…

3 years ago

Facebook Is Now Meta; A New Up-gradation To The World Of Social Media

Facebook Is Now Meta: Facebook for decades has stood to be one of the greatest…

3 years ago

Best Smartwatch 2021; Wearables For Android And iOS Smartphone

Best Smartwatch 2021: Smartwatches have managed to be a part of one's attire not just…

3 years ago

Unveil The Xiaomi Event: Learn About All The Launches From The House

Xiaomi Event has finally hit the entire globe revealing ample products including the much-awaited Xiaomi…

3 years ago

Uncover The Apple Event 2021; Have A Glance At All The Launches

The most awaited Apple Event 2021 has finally revealed a bunch of its products ranging…

3 years ago

iPhone 13 Series Expected Features And Rumors Before Launch

The Apple event is round the corner and this approaching event is letting ample speculations…

3 years ago