Categories: Security Hacker

Btlejacking Attack Could Allow a Hacker to Jam and Takeover the Bluetooth Connection

The Btlejacking Attack allows taking control over any Bluetooth Low Energy device, the attack abuses supervision timeout between two connected devices. The supervision timeout defines the time after which the connection is if no valid packets have been received.

Security researcher Damien Cauquil reveal the attack on Aug. 11 Defcon hacker conference and also he published as open-source tool BtleJack that enables you to sniff, jam and hijack Bluetooth Low Energy devices.

The Bluetooth jamming vulnerability can be tracked as CVE-2018-7252 and it affects the Bluetooth Low Energy(BLE) versions 4.0, 4.1, 4.2 and 5. In order to exploit the vulnerability, the attacker should be struck within 5 meters.

BtleJack Tool take-over Btlejacking

BtleJack not only provides an affordable and reliable way to sniff and analyze Bluetooth Low Energy devices and their protocol stacks but also implements a brand new attack dubbed “BtleJacking” Damien said.

The BtleJack Tool is capable of sniffing, jamming and hijacking Bluetooth Low Energy devices. All you need is to have a Micro: BIT embedded device worth $15 that created by BBC.

Btlejack Tool Usage

  • Sniff an existing BLE connection.
  • Sniff new BLE connections.
  • Jam an existing BLE connection.
  • Hijack an existing BLE connection (btlejacking).
  • Export captured packets to various PCAP formats.

Btlejacking attack poses a serious risk such as Unauthorized access to the device, Bypass authentication and Keep the device internal state intact which may lead to the data leak.

Starting from Bluetooth v4.2 BLE connections are secure it uses Elliptic Curve Diffie Hellman (ECDH) for key generation. “BLE hijacking is real and should be considered in your threat model,” Damien said.

“To avoid Btlejacking attacks BLE Secure Connections can include code injection protection with authentication code added to all packets that avoid Btlejacking attacks,” Damien said.

Also Read

New Bluetooth Vulnerability Affected Millions of Devices that Allow Hackers to Steal the Encryption key

Critical BlueBorne Vulnerability Puts More Than 5 Billion Bluetooth Enabled Devices Under Attack

Half a Billion Enterprise IoT Devices are Vulnerable to DNS Rebinding Attack – A Remote Network Control Attack

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

The Future of Authentication: Moving Beyond Passwords

Traditional passwords have been the cornerstone of digital security for six decades, but their reign…

1 hour ago

CentreStack 0-Day Exploit Enables Remote Code Execution on Web Servers

A critical 0-day vulnerability has been disclosed in CentreStack, a popular enterprise cloud storage and…

2 hours ago

Over 100,000 WordPress Plugin Vulnerability Exploited Just 4 Hours After Disclosure

Over 100,000 WordPress websites have been exposed to a critical security vulnerability, following the public…

3 hours ago

Hackers Use Microsoft Teams Chats to Deliver Malware to Windows PCs

A sophisticated cyberattack campaign has emerged, leveraging Microsoft Teams chats to infiltrate Windows PCs with…

4 hours ago

Apache Roller Vulnerability Allows Hackers to Bypass Access Controls

A newly disclosed vulnerability in Apache Roller, the popular open-source blog server, could allow attackers…

4 hours ago

Galaxy S24 Vulnerability Poses Risk of Unauthorized File Access

A security flaw in Samsung’s Quick Share feature for the Galaxy S24 series has been…

5 hours ago