Bluetooth Wireless Threats

Embed Size (px)

Citation preview

  • 8/2/2019 Bluetooth Wireless Threats

    1/30

    Michael Britt

  • 8/2/2019 Bluetooth Wireless Threats

    2/30

    Wireless threats are all around in today'ssociety, wireless threats come in all shapesand sizes from someone attaching to yourWireless access point without authorization.

    Wireless communication is broadcasted overradio waves, and it allows individuals toeavesdrop. Eavesdroppers listen to thewireless transmissions, and it is possible for

    an eavesdropper to pick up confidentialinformation. (Inform IT, Wireless SecurityThreats)

  • 8/2/2019 Bluetooth Wireless Threats

    3/30

    Wireless threats are becoming more popularwith the advancement of technology. Cellphones today can do a multitude of taskscompared to phones of earlier generations.

    What individuals and corporations dontrealize is that they are at just as much of arisk for potential security threats on theirphones as they are at home or on their work

    computers. Taking the necessary precautionscan protect confidential information.

  • 8/2/2019 Bluetooth Wireless Threats

    4/30

    Bluetooth: What is it?Bluetooth is a wireless transmission standard

    that facilitates the connection amongelectronic computing devices, in short range.

    Bluetooth Transmission can be anywherebetween 1 meter or 100 meters.

    Bluetooth Transmits data over a 2.4 GHz RadioFrequency. This frequency band has been set

    aside by international agreement for the useof industrial, scientific and medical devices.(Technology in Action, Bluetooth)

  • 8/2/2019 Bluetooth Wireless Threats

    5/30

    Bluetooth was founded in September of1998.(History of Bluetooth, Blue Tomorrow)

    The name Bluetooth was given its name fromthe Danish king Harald Blaatand. The DanishKing was the one who fused Denmark andNorway between 940 and 985 AD. The DanishKing is known to bring together the telecomand computing industries in todays world.(History of Bluetooth, World Start)

  • 8/2/2019 Bluetooth Wireless Threats

    6/30

    Malicious software did not impose threats onconsumers until 2004. The first event of thiswas when the Cabir Smart Phone wormattempted to spread amongst Symbian based

    phones. June 14, 2004 was its intended dateto virtually destroy the Symbian basedphones. Cabir was the first network wormcapable of spreading through Bluetoothtechnology. (Worm.SymbOS.Cabir.a, VirusList)

  • 8/2/2019 Bluetooth Wireless Threats

    7/30

    Bluetooth can be found on: Keyboards, Headsets, Printers, PDAs, Cell

    Phones, Desktops, Wii, Playstation 3, andLaptops.

    It is used to easily attach these portabledevices without the use of cables or wires.

    With the use of Bluetooth users can simplywalk into a room and be connected without

    wires, configuration changes, andtroubleshooting. (How Internet and PersonalSecurity Work, How Bluetooth Works)

  • 8/2/2019 Bluetooth Wireless Threats

    8/30

    Bluetooth connections are wireless andautomatic. They require no configurations.This is called an Ad Hoc network, there is noserver or access point. The type of network

    that Bluetooth uses is called a Peer to Peernetwork. (How Internet and Personal SecurityWork, How Bluetooth Works)

  • 8/2/2019 Bluetooth Wireless Threats

    9/30

    Bluetooth has a microchip implanted in thecompatible device, the software is called a linkcontroller. The link controller is what seeks otherBluetooth devices.

    After a Bluetooth device finds another device theycommunicate to see if they should connect withone another. They decide if they shouldcommunicate based on their Bluetooth profile.

    Once the two devices decide if they should

    connect they set up a connection which is calleda PICONET. (How Internet and Personal SecurityWork, How Bluetooth Works)

  • 8/2/2019 Bluetooth Wireless Threats

    10/30

    Once the Bluetooth devices set up aconnection, it allows them to communicatewith one another simultaneously.

    Bluetooth is used to send and receiveinformation from other wireless devices.

    (How Internet and Personal Security Work, HowBluetooth Works)

  • 8/2/2019 Bluetooth Wireless Threats

    11/30

    Bluetooth Can operate on Three SecurityModes:

    1) Mode 1, which is non secure

    2) Mode 2, which Provides Security at theservice level, after a channel is established.

    3) Mode 3, which provides security at the linklevel, before the channel is established.

    (Windows Security, Bluetooth Security Issues)

  • 8/2/2019 Bluetooth Wireless Threats

    12/30

    Individuals and Corporations Owners of any Bluetooth devices

    Example: Smart Phones, PDAs, Pocket PCs

    (PenTest, Bluetooth Security Issues)

    Many users set their phones on what hackers calldiscoverable mode in order to use Bluetoothdevices, but individuals almost always leave it inthat mode, when they are not even using there

    Bluetooth device. "Fifty to seventy percent of thephones we see are vulnerable. (Tech world,Bluetooth Phones Easily Hackable)

  • 8/2/2019 Bluetooth Wireless Threats

    13/30

    Theft of information, this could be personalinformation, or Corporate information.

    Location based SPAM, which is based on yourphysical location. (Perimetec, Spam to mobile

    devices based on your physical location) Bluetooth mobile phones can be hacked fairly

    easy. If your mobile phone is hacked throughBluetooth it is letting someone steal phonebooks, images, calendar information, or anything

    else that you may have stored on your Bluetoothenabled phone. (Bluetooth phones easily hackable, Techworld)

  • 8/2/2019 Bluetooth Wireless Threats

    14/30

    BlueSnarf Bluejacking

    BlueBug

    Car Whispering Head Phone Hacking

  • 8/2/2019 Bluetooth Wireless Threats

    15/30

    BlueSnarf was one of the first attacks usedwith Bluetooth. A hacker would have todownload this type of software, it is used tofind a flaw in Bluetooth access software.

    The software will then begin to search forBluetooth devices operating in discoverymode. (How Personal and Internet SecurityWork, How Bluesnarfing Works)

    BlueSnarf, is easy to use and is cheap toperform. (Technology in Action, PreventingBluetooth Attacks)

  • 8/2/2019 Bluetooth Wireless Threats

    16/30

    BlueSnarf is an attack that uses OBEX which is acommunications protocol. OBEX allows theexchange of binary objects between devices.OBEX is a Push Profile. This form of an attack iseasy to use when the Bluetooth device is set invisible mode. BlueSnarf allows access to a phonebook of a connected cell phone withoutauthorization. When a potential hacker usesBlueSnarf they can steal any information that may

    be stored. This attack also lets a hacker corruptany phone in range. (How Personal and InternetSecurity work, How Bluesnarfing Works)

  • 8/2/2019 Bluetooth Wireless Threats

    17/30

    Bluejacking is done when a Bluetooth deviceexchanges at the beginning of its connection,it allows the hacker to take advantage of anyof the IDs that the devices exchange.

    Bluejacking allows a hacker to steal aphonebook, calendar, or any data files.

    BlueJackers make use of this ability mostly tosend offensive messages, or to disturbindividuals. (computer news me, Bluejacking)

  • 8/2/2019 Bluetooth Wireless Threats

    18/30

    Bluebug is an attack that allows the hacker access tothe AT commands of a cellular phone. This form of anattack would allow the hacker to use the phonesservices without the owners knowledge.

    A hacker could intercept incoming and out going

    calls. Bluebugging is a Bluetooth security loophole on some

    older cell phones, Newer phones are not affected.(Going around with Bluetooth in Full Safety, BlueBug)

    BlueBug, is difficult, and much more expensive toexecute when compared to Bluesnarfing. (Technologyin Action, Preventing Bluetooth Attacks)

  • 8/2/2019 Bluetooth Wireless Threats

    19/30

    Car Whispering is a relatively new phenomenon.Car Whispering is revealing vulnerabilities withrelatively new Cars that are Bluetooth compatible.With this a Hacker could be near by and could

    use long range or even short range Bluetoothantennae, and hack into the Cars Bluetoothdevices. The use of Car whispering could be usedfor going after individuals or companies. The

    attack could be used to distract the driver, andpossibly cause an accident. (Loose Wire Blog, CarWhispering)

  • 8/2/2019 Bluetooth Wireless Threats

    20/30

    Head Phone Hacking, Bluetooth headsets canbe exploited through hacking. The hackerwould have the ability to record and injectaudio messages through the headset while

    the device is not in an active call. BluetoothHackers make use of this Loop hole toeavesdrop, send offensive messages.(Computer News, Securing Bluetooth)

  • 8/2/2019 Bluetooth Wireless Threats

    21/30

    In order to protect your self from BluetoothWireless Threats you should be careful whendownloading New programs or applications fromthe Internet, and make sure that it is a credibleweb site.

    Make sure that your device functions properly,the way it was when it was purchased from thefactory.

    Always deactivate the Bluetooth device when notin use.

    Try to update the security software as soon aspossible. (Technology in Action, PreventingBluetooth Attacks)

  • 8/2/2019 Bluetooth Wireless Threats

    22/30

    Bluetooth uses Man made electromagneticFrequencies. These frequencies are alsoknown as EMFs. (EMF Blues, Bluetooth EMFSafety)

    When using wireless technology you areputting yourself in the presence of Microwaveradiation.

    Long term Contact to Electromagnetic

    Frequencies has been linked to Cancer, BrainTumors, ADD, Miscarriages, and even Hairloss. (EMF Blues, Bluetooth EMF Safety)

  • 8/2/2019 Bluetooth Wireless Threats

    23/30

    EMF has been known to change and affectBiological changes in the human body. Thesebiological changes can be passed throughgenetics.

    Bluetooth headsets expose the brain, ears,and even your eyes to EMFs. BluetoothHeadsets have been known to causeDeafness, Brain Tumors, and Headaches. (EMFBlues, Bluetooth EMF Safety)

  • 8/2/2019 Bluetooth Wireless Threats

    24/30

    Bluetooth, has been going up compared to theslow economy. Bluetooth will continue to experience high

    market growth, according to In-Stat/MDR. (GeekZone, Strong Growth for Bluetooth In Spite of the

    Economy) The main challenge for Bluetooth is to educate its

    users on the technology, instead of thetechnology behind Bluetooth.

    Bluetooth is expected to grow from 10.4 million

    to 510 million units from the year 2001 to 2006.this will be a 118% annual growth rate. (GeekZone, Strong Growth for Bluetooth In Spite of theEconomy)

  • 8/2/2019 Bluetooth Wireless Threats

    25/30

    Many market analysts believe that BluetoothWill have a growing market through the year2007. this is believed due to the use ofBluetooth and mobile phones.

    In-Stat predicts that Bluetooth will increaseits growth by 34% in 2007 which is adownturn from past years in the economy.(PC Authority, Bluetooth to Suffer Market SlowDown)

  • 8/2/2019 Bluetooth Wireless Threats

    26/30

    A survey conducted by In-Stat shows that France,Germany, an the UK have the most individualsfamiliar with the use of Bluetooth, and Korea and

    Japan had the lowest percentages, while the

    United States was in the middle. (PC Authority,Bluetooth to Suffer Market Slow Down)

    According to a Mobile Security Report of 2008,13.7% of those polled from Japan, United

    Kingdom, and the United States were aware thatthey may have been a victim of an attack bymobile phone viruses.

  • 8/2/2019 Bluetooth Wireless Threats

    27/30

    Mobile phone radiation is another issue thatis causing complaints from Bluetooth wirelessTechnology. In recent studies in the UnitedStates, results showed an increased risk of

    Electro Magnetic Frequency. EMFs have beenrelated to Cancer, Brain Tumors,Miscarriages, Birth defects, alterations inDNA, and RNA.

  • 8/2/2019 Bluetooth Wireless Threats

    28/30

    Bluetooth, May be headed for a massive re-invention that includes a possibility for newmarkets and applications to emerge in thenext two years in Asia, and even around the

    world. Bluetooth inventors one day soonbelieve that a new version will be able tomonitor blood pressure or glucose levels, andhave tremendous amounts of help in the

    Medical World. (Tele com asia, A New Age ForBluetooth)

  • 8/2/2019 Bluetooth Wireless Threats

    29/30

    Wireless threats will continue to grow, withthe growth of technology. With the growingrate of Smart Phones and PDAs more andmore threats will develop. As more and more

    phones use the WIFI networks there is goingto be more and more information out there.With more information hackers are going tocontinue to steal confidential information. Inorder to prevent wireless threats individualsneed to take the necessary precautions tomake sure that they are protected.

  • 8/2/2019 Bluetooth Wireless Threats

    30/30

    Evans, Alan. Technology in Action. 5th ed. Upper Saddle River: Pearson, 2009.

    "History of Bluetooth - WorldStart Computer Tips and Computer Help." WorldStart.com - The Best Computer Tips andSoftware Deals on the Internet! 05 Apr. 2009 .

    "Bluetooth History." Bluetooth Technology - Home. 05 Apr. 2009.

    "Viruslist.com - Worm.SymbOS.Cabir.a." Viruslist.com - Information About Viruses, Hackers and Spam. 05 Apr. 2009.

    Gralla, Preston. How Personal and Internet Security Work. Indianapolis: Que, 2006.

    "Bluetooth: Is it a Security Threat?" Network Security Articles for Windows Server 2003, 2008 & Vista. 05 Apr. 2009.

    "Techworld.com - Bluetooth phones easily hackable." Techworld.com - Techworld IT infrastructure and networks. 05 Apr.2009 .

    "Securing Bluetooth | Technology |." Computer News Middle East: Enterprise Resource for CIOs. 05 Apr. 2009.

    "The Next Kind of Bluetooth Threat: Car Whispering." Loose wire blog. 05 Apr. 2009.

    "Bluetooth EMF Safety." Welcome to EMF Blues! 05 Apr. 2009 .

    "InformIT: Wireless Security Wireless Threats." InformIT: The Trusted Technology Learning Source. 05 Apr. 2009.

    Welcome to Pentest Limited. 05 Apr. 2009 .

    "The future: spam to mobile devices based on your physical location | Perimetec." AntiSpam Filter & Anti Spam FilteringServices | Perimetec. 05 Apr. 2009 .

    "Strong growth for Bluetooth chipsets in spite of economy." Geekzone: technology news, blogs, forums. 05 Apr. 2009.

    "Bluetooth to suffer market slowdown - News - PC Authority." PC Authority - Tech reviews, advice, news, downloads and forums. 05 Apr. 2009.

    "A new age for Bluetooth." Telecomasia.net. 05 Apr. 2009 .