Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Bluetooth Devices at Risk From Btlejacking Takeover Attack

    Written by

    Sean Michael Kerner
    Published August 13, 2018
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Hundreds of millions of Bluetooth devices are potentially at risk from a new Bluetooth attack vector called Btlejacking that was disclosed on Aug. 11 at the Defcon hacker conference in Las Vegas.

      The new attack is a Bluetooth jamming method identified as CVE-2018-7252 that could enable a hacker to take over vulnerable Bluetooth connections with a simple $15 device and a few lines of open source code. The Btlejacking attack was disclosed by Damien Cauquil (pictured), head of research and development at Digital Security. Cauquil also unveiled open-source Btlejack Bluetooth attack software that enables sniffing, jamming and takeover of vulnerable Bluetooth devices.

      Cauquil said existing techniques and approaches to attack Bluetooth Low Energy (BLE) connections have required costly hardware and have been incomplete, which is why he developed the Btlejack tool.

      Intercepting and seeing traffic—an activity commonly referred to as “sniffing”—is not an easy thing for BLE, according to Cauquil. BLE by design has been built to make sniffing difficult with multiple techniques, including the use of three separate radio channels and the Frequency Hopping Spread Spectrum (FHSS), which is constantly moving signals around, he said. Existing technologies including Software Defined Radio tools, which cost upward of $200, can sniff some BLE traffic, and Cauquil said the popular Ubertooth One BLE sniffing hardware, which costs over $100, provides another option for those looking to sniff Bluetooth traffic. However, Cauquil said existing technologies are lacking as they don’t have visibility into BLE connections that are already active.

      “Sniffing BLE today is hard and expensive,” Cauquil said.

      In 2016, Cauquil released the open-source Btlejuice project, which provides a mechanism to intercept BLE connections with a man-in-the-middle (MiTM) attack. While Btlejuice had some success, Cauquil admitted that it was complex to set up and didn’t support all types of BLE devices or pairing methods.

      “It’s time to improve the BLE arsenal,” he said. “We need a tool that can sniff existing and new connections, uses cheap hardware and is open source.”

      Btlejack

      Cauquil said Btlejack is able to sniff both existing and new BLE connections, as well as jam BLE signals. Going a step further, Btlejack can enable the new CVE-2018-7252 attack, which Cauquil has dubbed “btlejacking” and could enable an attacker to take over a BLE connection. From a hardware perspective, Cauquil said all that is needed to run Btlejack is a Micro:BIT embedded computer, which is a $15 small board that was created by the BBC.

      The Btlejacking attack itself abuses a capability in BLE known as the Supervision Timeout—the period of time after which a BLE connection is considered lost if no valid packets have been received. Cauquil discovered that BLE sends a “keepalive” packet every so often to keep the connection alive. When the BLE connection to a peripheral device is jammed and the keepalive packet isn’t received, the Supervision Timeout countdown starts.

      “The fun fact is the peripheral still gets packets back from the central device, so it’s not actually disconnected, ” Cauquil said. “Then we can have some fun.”

      Btlejacking abuses the BLE supervision timeout to take over a connection and works on BLE versions 4.0 and up. Cauquil added that, like all BLE connections, the Btlejacking attack requires proximity of up to 5 meters from the target to work. In a series of recorded demos, he showed how Btlejack was able jam and then take over BLE connections on devices including an in-flight drone.

      Btlejacking has been given the CVE-2018-7252 identifier, which actually is a set of three flaws. Cauquil said CVE-2018-7252 enables unauthorized access to a device even if it is already connected. Btlejacking also enables an attacker to bypass authentication, and it can keep the impacted devices’ internal state intact, which may lead to information leakage.

      Mitigation

      While Btlejacking is a new attack method, there is already a technical mechanism that BLE device vendors can implement to mitigate the risk.

      “The BLE specification provides a mechanism for secure connections,” Cauquil said.

      The BLE Secure Connections capability was added in Bluetooth v4.2 and makes use Elliptic Curve Diffie Hellman (ECDH) for key generation. The Secure Connections capability is an option over the typical simple pairing approach that is used by most BLE connections. 

      Cauquil said BLE Secure Connections can include code injection protection, with authentication code added to all packets that can help avoid the Btlejacking attacks. He warned, however, that if a device is using BLE Secure Connections without the packet injection protection option, Btlejacking would still likely work.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.