BlueBorne Attack Bluetooth Can Be Hack Your Phone Or PC
"BlueBorne Attack" Bluetooth Can Be Hack Your Phone Or PC
Dubbed “BlueBorne” by researchers, the attack can be successfully carried out without any user interaction. That means any device with Bluetooth enabled can be infected without needing the user to click on a malicious link or visit a compromised website. All an attacker needs is to stay close or at least 32 feet away from the targeted device and rest is history.
Since the cyber attacks are wireless, malware using the advantage of Blueborne could flow from device to device. That worst-case situation would see the malware rapidly catch all vulnerable systems and spread as users with infected receivers move from place to place.
Bluetooth is employed on phones, computers, and other devices. Different mechanisms are affected by many sets of vulnerabilities encapsulated by Blueborne.
“BlueBorne is an attack vector by which hackers can leverage Bluetooth connections to penetrate and take complete control over targeted devices. BlueBorne affects ordinary computers, mobile phones, and the expanding realm of IoT devices. The attack does not require the targeted device to be paired to the attacker’s device, or even to be set on discoverable mode,” said the security firm Armis.
Google published a patch for Android devices last Tuesday while Linux announced a fix one week later. Current Apple operating systems are not exposed to the attack, but older iOS systems are. Microsoft repaired the problem in July for supported versions of Windows.
Another good news is those iPhone devices running on iOS 10 are safe from this attack while Google issued a security patch a month ago to secure Android users however it might take some time for every Android user to get the patch on their device since it all depends on the manufacturers. Linux, on the other hand, is expected to issue a patch soon.
Android and Windows systems are unprotected to “man in the middle” attacks, where an intruder intercepts communications between devices by secretly serving as a relay station between the two. An intruder can use this to observe all traffic and steal authentication information. It could also modify data in transit.
The good news is that Microsoft has already patched the vulnerability without announcing it back in July. But, Windows users should make sure their devices are up to date in order receive security patches.
According to a Microsoft spokesperson “Microsoft released security updates in July and customers who have Windows Update enabled and applied the security updates, are protected automatically. We updated to protect customers as soon as possible, but as a responsible industry partner, we withheld disclosure until other vendors could develop and release updates.”
Post a Comment