The latest Bluetooth hacking technique, BlueBorne, has the power to infiltrate devices on all operating systems.
Researchers from a prominent security firm, Armis, have recently unveiled a brand new way of hacking mobile devices via Bluetooth. According to them, this latest technique, dubbed BlueBorne, has the power to infiltrate millions of devices over all operating systems, including iOS.
Bluetooth is a popular way to connect devices to one another wirelessly over a short distance. Yet a vulnerability discovered in this mechanism will enable hackers to infiltrate devices, take over devices, and give them access to sensitive information. This will affect devices from all major brands like Apple, Google, Microsoft, and Samsung.
The hacking can affect any device that is Bluetooth enabled and is not limited to smartphones.
So far Armis researchers have been able to hack a Google Pixel phone, Samsung Galaxy phones and tablets, LG Sports Watches, and a car infotainment system using BlueBorne.
The particular Bluetooth vulnerability can be found in all devices and is not specific to a certain device. Apple devices that have not been updated to iOS 10 are also vulnerable to attack.
The Armis researchers said the problem had also been found across potentially billions of Android, Microsoft, Samsung and Linux devices. Any iPhones and iPads that haven’t been updated to iOS 10 or later are also vulnerable.
According to Armis researchers, the one factor which makes BlueBorne particularly alarming is the way in which it operates. Unlike most other malware attacks that rely on an internet connection and on user interaction, BlueBorne simply spreads through the air and requires no interaction on the part of the owner of the device.
The fact that it doesn’t require interaction or permission gives BlueBorne the potential to be far more aggressive than any other device hacking technique we’ve seen so far. BlueBorne surpasses all modes of traditional malware detection and also is done so stealthily that the user would not even notice an infected device.
Fortunately, Microsoft, Google, and Linux are all currently working on updates or patches to address this vulnerability. Apple users are not at risk as long as their phone is updated to at least iOS 10. Samsung is yet to respond to the latest threat.