Most attack vectors require a user to click on a malicious link or download a file containing a payload.
Computer viruses have finally become airborne with the discovery of BlueBorne - a Bluetooth-highjacking infection.
Discovered by Armis Labs, this new threat applies to mobile phones, computers, and IoT devices. And if you use it 24/7 on your phone because of a peripheral like a smartwatch, you can at least turn it off on your other devices, especially any Bluetooth-enabled Internet of Things gear. "First, the attacker locates active Bluetooth connections around him or her. Devices can be identified even if they are not set to "'discoverable' mode. As he makes deliveries to different locations, including relatively secure ones such as banks, BlueBorne is able to spread to multiple Bluetooth devices. And it could even serve as the launchpad for the creation of large botnets like Mirai and WireX.
Furthermore, based on their discussions with vendors, they believe that 40% of the impacted devices will never be patched, either because they're old and won't receive firmware updates at all or because updating them is too complicated and users won't bother.
The researchers say the ones running BlueZ are affected by the information leak vulnerability (CVE-2017-1000250). "They can just wait until you have Bluetooth turned on". "We encourage other researchers to use this paper as a guideline for the various pitfalls that might exist in implementations of Bluetooth stacks".
"These vulnerabilities are the most serious Bluetooth vulnerabilities identified to date", Armis explained, in an alert.
(Tech Xplore)-If you ask two researchers what is the problem with Bluetooth they will have a simple answer. BlueBorne can conduct remote code execution and Man-in-The-Middle attacks, for example, the post said.
Those who are affected but can't get patches are advised to leave Bluetooth switched off. Through this vulnerability, an attacker can get hold of your phone without even physically approaching it.
An nearly identical man-in-the-middle issue was found in the Android Bluetooth stack. They also do not need pairing to be implemented.
The Linux and Android devices are still vulnerable despite the limited attack; Bluetooth has lots of known vulnerabilities in it which can be used to target specific devices. So the attack is made without prior information to users.
While there is no mention of Android Oreo, Google has issued security patches for Android Nougat and Marshmallow as a part of the September Security Bulletin.
"While patches for smartphones, laptops and other internet-enabled devices are relatively easy to push out, for dumber gadgets the same can't be said".