• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

BlueBorne Bluetooth Vulnerabilities – Daily Security Byte

September 18, 2017 By Corey Nachreiner

Imagine this nightmare wireless attack scenario. A guest walks into your offices not realizing his mobile wireless device is already infected with malware that spreads wirelessly. This guest’s device automatically infects any other device it comes into proximity with. The infection doesn’t require your users to interact in any way, nor does it require them to pair their devices with the malicious one. The attack just happens seamlessly in the background, without your users even knowing.

According to researchers at Armis, this attack exists and is called BlueBorne. In reality, BlueBorne is eight different bluetooth vulnerabilities Armis found in different platforms, including iOS, Android, Windows, and Linux. They can combine some of these vulnerabilities to create self-spreading bluetooth malware, like the scenario described above. Watch today’s video for more information about this attack and how to avoid it, and be sure to check out the white-paper linked below if you want all the details.

Episode Runtime: 2:29

Direct YouTube Link: https://www.youtube.com/watch?v=liltkSgUQz0

EPISODE REFERENCES:

  • BlueBorne attack puts 5 billion devices at risk – PC Mag
  • Research organization’s general overview site on BlueBorne – Armis
  • Video highlighting the potential Blueborne attack – YouTube
  • Detailed technical whitepaper on the BlueBorne vulnerabilities [PDF] – Armis

Corey Nachreiner, CISSP (@SecAdept)

Share This:

Related

Filed Under: Security Bytes Tagged With: Software vulnerabilities

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • US National Cybersecurity Strategy
  • Here Come The Regulations
  • Cybersecurity’s Toll on Mental Health

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
  • An Update on Section 230
  • Here Come The Regulations
  • US National Cybersecurity Strategy
  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use