{"id":1637,"date":"2013-04-15T11:14:09","date_gmt":"2013-04-15T15:14:09","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=1637"},"modified":"2017-09-24T08:25:24","modified_gmt":"2017-09-24T12:25:24","slug":"bluetooth-security","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/bluetooth-security\/1637\/","title":{"rendered":"Bluetooth Connectivity Threatens Your Security"},"content":{"rendered":"<p>Everyone loves the hands-free convenience that Bluetooth enables \u2014 some people love it a little too much and insist on wearing their Bluetooth ear pieces every waking hour like they\u2019re action heroes perpetually on the cusp of the next great adventure.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/04\/06051125\/bluetooth_blog_title.jpg\"><img decoding=\"async\" class=\"size-full wp-image-1638 aligncenter\" alt=\"Bluetooth\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/04\/06051125\/bluetooth_blog_title.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<p>But that\u2019s not the only ugliness of Bluetooth, which has been vulnerable to security exploitations since its inception. The earliest form of this was the Cabir worm, which is believed to have been the first wireless worm. It could transmit itself to mobile phones using the Symbian platform when those devices were turned on and in discoverable mode. While it wasn\u2019t very harmful \u2014\u00a0it sent a message with the caribe.ss file attached; when downloaded the file displayed the word \u201cCaribe\u201d on the handset screen \u2014 it served as a wakeup call to the industry.<\/p>\n<p>Bluetooth threats have evolved since those days, and while they aren\u2019t extremely dangerous they can still be quite serious.<\/p>\n<p><strong>Bluejacking<\/strong> is basically Bluetooth spam. Bluetooth users can send what is essentially an e-business card to other Bluetooth users within a 30-foot radius of their device; if downloaded that e-card can add the contact to the now-infected user\u2019s address book. That contact then can send messages to this infected device. And some Bluejackers make the spam delivery even more simple, putting the spam directly into the Blutooth device name so when the recipient receives a message that a new device tried to connect, the requesting device is identified by the smap message \u2014 \u201d \u201830% Off Name-Brand Prescriptions\u2019 is trying to connect to your device,\u201d for instance. Such attacks can be increased to a 300-plus-foot radius if the attacker is using a directional antenna and amplifier.<\/p>\n<p>The <strong>Car Whisperer<\/strong> is software that lets attackers send audio to, and receive audio from, a Bluetooth-enabled car stereo. This means that these attackers can listen to your calls and chime in, if they want to.<\/p>\n<p><strong>Bluebugging<\/strong>, is a bit more dangerous than the first two, allowing attackers to remotely access a user\u2019s phone and use its features, including listening to calls, forwarding incoming calls, placing calls and sending text messages \u2014 and the user doesn\u2019t realize what\u2019s happening. This can result in expensive phone bills if its used to make premium or international calls.<\/p>\n<div class=\"pullquote\">Bluetooth attacks depend on exploiting the permission request\/grant process that is the backbone of Bluetooth connectivity.<\/div>\n<p>Bluetooth attacks depend on exploiting the permission request\/grant process that is the backbone of Bluetooth connectivity. Regardless of the security features on your device, the only way to completely prevent attackers from exploiting that permission request\/grant process is to power off your device\u2019s Bluetooth function when you\u2019re not using it \u2014 not putting it into an invisible or undetectable mode, but completely turning it off (there are bad apps that can power your device back on, just one more reason overall app security is vital).<\/p>\n<p>There are lots of battery management apps out there that will do this for you automatically: Tasker and Juice Defender and the <a href=\"http:\/\/news.cnet.com\/8301-17938_105-57359901-1\/sonys-smarttags-could-change-phone-habits\/\" target=\"_blank\" rel=\"noopener nofollow\">NFC-enabled Sony SmartTag<\/a> are among those that can do this for Android devices. Battery Doctor, Battery Life Pro and Battery are three that can do it for iOS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Everyone loves the hands-free convenience that Bluetooth enables \u2014 some people love it a little too much and insist on wearing their Bluetooth ear pieces every waking hour like they\u2019re<\/p>\n","protected":false},"author":41,"featured_media":1639,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[381,97],"class_list":{"0":"post-1637","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-bluetooth","9":"tag-security-2"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/bluetooth-security\/1637\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/bluetooth-security\/1637\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/bluetooth-security\/1637\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/bluetooth-security\/1637\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/bluetooth-security\/1637\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/bluetooth-security\/681\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/bluetooth-security\/1637\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/bluetooth-security\/1637\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/bluetooth\/","name":"Bluetooth"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1637"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1637\/revisions"}],"predecessor-version":[{"id":19511,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1637\/revisions\/19511"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/1639"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}