BlueBorne is an attack revealed by Armis labs . This attack endangering major mobile desktop, and IoT operating systems, including Android, iOS, Windows, and Linux, and the devices using them. Blue Borne allows attackers to take control of devices and spread malware by accessing your device.
What is BlueBorne ?
BlueBorne is an attack virus that spread via bluetooth and after that hacker can take full control of your device. It does not need to be paired with attacker's device ,hacker can access your device via bluetooth but without any pairing.
If your bluetooth is on or your are connected with already infected device then your device will also get infected and virus will transferred to you device without asking for any permission .
All these work is being done by this blueborne attack behind the scene and even you don't know anything about it.
How attacker attacks?
- First, the attacker locates active bluetooth connections in his or her vicinity. Devices can even be identified with “discoverable” mode set to off.
- Next, the attacker obtains the device’s MAC address that identifies that specific device uniquely.
- Then, the attacker explores the device and determines which operating system his victim is using and adjusts his exploit accordingly.
- Finally, the hacker exploits a vulnerability of the bluetooth protocol and can choose to create a Man-in-The-Middle attack and control the device’s communication or take full control over the device and use it for many cybercriminal purposes.


No comments:
Post a Comment