In today, I'm about to tell you about BlueBorne Bluetooth Attack. BlueBorne looks very strange in hearing this name and if you talk about its misdeeds, you might also be stunned. Yes, friends, the topic that I'm going to tell you today is BlueBorne, these recent events are in the limelight.
This is a danger we can not ignore, even if we want to. That's because we are so much connected to these modern devices that without our support we can not live without it or if we say so, then we have completely become theirs.
This is a danger we can not ignore, even if we want to. That's because we are so much connected to these modern devices that without our support we can not live without it or if we say so, then we have completely become theirs.
For the past few years, as our scientists are invoking modern instruments, the way of life is becoming very easy. They do not say that which is as easy to get as easily as it is to keep it close to you. And this is happening with modern machines nowadays.
Because today we are creating a database of all of us who are using the online facility where all our related information is being kept. Recently the whole world saw the naked eye of Malware attacks, how a RansomeWare "WannCry" had put many people in their nose.
Because today we are creating a database of all of us who are using the online facility where all our related information is being kept. Recently the whole world saw the naked eye of Malware attacks, how a RansomeWare "WannCry" had put many people in their nose.
From now on we have just emerged or not, a new threat is moving in everyone's head. Yes, the security researchers of Armis Labs have published a detailed paper in which many details have been given about this danger. According to them, all of our Bluetooth devices are now confronted with any MiTm (Man in the Middle) attack.
If you already know about it then this is a good thing but if not, then according to me, I am going to tell you about this attack "What is BlueBorne" so that you have some information about this danger already . So let's start without delay and know what BlueBorne is.
If you already know about it then this is a good thing but if not, then according to me, I am going to tell you about this attack "What is BlueBorne" so that you have some information about this danger already . So let's start without delay and know what BlueBorne is.
What is BlueBorne?
This is a threat that allows your mobile or any bluetooth enabled devices to be fully controlled without your permission. Yes, friends take full control over Cyber Criminals Your Mobile Phones in this BlueBorne attack just by using your Bluetooth connection and also without having any action on your mobile.
The most shocking thing here is that they do not even need to pair your mobile to do this, nor to keep your mobile in a dicoverable mode. The seriousness of this matter is so much because more than 500 million mobile phones are in the grip of this attack and the fact of Tajub is that we are not even aware of it.
The most shocking thing here is that they do not even need to pair your mobile to do this, nor to keep your mobile in a dicoverable mode. The seriousness of this matter is so much because more than 500 million mobile phones are in the grip of this attack and the fact of Tajub is that we are not even aware of it.
Another thing that is important in this is that this attack is slowly spreading to the whole world because it is like a virus that spreads through mobile to mobile from one mobile to another. Its code is remotely execute so that users do not know about it at all.
Which are in the grip of Devices / Platform BlueBorne?
As I have said before, this BlueBorne attack almost all Bluetooth enabled smartphones, desktops, entertaining systems and medical devices that run in different platforms like Android, iOS, Windows and Linux. Today there are more than 300 million Android devices in the world, in which the Bluetooth facility is available, as well as 200 million Windows devices, 150 million Apple devices and 800 million IoT devices are Mehjood.
And that's why you will learn more about why it is a matter of great concern that the security of all these devices is now in full danger. These concerns have now become the main subject of many cyber-security researchers, device manufacturers and privacy advocates, and they are thinking about their solution in the day-to-day.
And that's why you will learn more about why it is a matter of great concern that the security of all these devices is now in full danger. These concerns have now become the main subject of many cyber-security researchers, device manufacturers and privacy advocates, and they are thinking about their solution in the day-to-day.
According to these researchers, there are two such platforms which are the first to come in BlueBorne's target, which are Android and Linux. This is because the Bluetooth functionality has been implanted in some of these operating systems in such a way that it can attack their memory very easily and virtually run malicious code in it, so that attackers can easily make the Victims important and sensitive resources can exploit and if Victim can reboot their mobile again and again but it will not get rid of it.
How do hackers use BlueBorne?
BlueBorne is a highly infectious airborne attack vector which can be easily spread from one device to another device by air, which means that even a single infected device can easily infect all devices. The root cause of this infection is that most of the devices use Bluetooth technology today and as it spreads through Bluetooth.
And having Bluetooth bluetooth in all platforms makes it more powerful. And once it has infected any device, the attackers have full control over that device. From this, they misuse them, such as the theft of data, many wrong things like the Firoti. They can also install any Ransomware and many can do Cyber Crime. It does not even require internet to infect, just bluetooth is enough for Infection.
And having Bluetooth bluetooth in all platforms makes it more powerful. And once it has infected any device, the attackers have full control over that device. From this, they misuse them, such as the theft of data, many wrong things like the Firoti. They can also install any Ransomware and many can do Cyber Crime. It does not even require internet to infect, just bluetooth is enough for Infection.
How do you know if your device is affected by BlueBorne or not?
According to Armis, all major computational platforms have somehow been affected by BlueBorne. But some versions of some operating systems are slightly vulnerable or vulnerable.
1. Windows
All of the Windows desktops, laptops and tablets in which the operating system running Windows Vista or older is affected by the vulnerability of "Blutooth Pineapple" and that the attacker is affected by Man-in-The-Middle attack (CVE-2017-8628 ) is helping to run.
2. Linux
Any device in which the operating system that is based on Linux kernel (version 3.3-rc1 and newer) can run the code of the attacker remotely vulnerability (CVE-2017-1000251). With that all the linux devices in which BlueZ is running are affected by all information leak vulnerability (CVE-2017-1000250). With this, there are more devices in the grip of BlueBorne attack such as Smartwatches, televisions and kitchen appliances in which open sources of Tixen Os run.
3. iOS
All the iPhones, iPads, and iPod Touch devices running operating systems of iOS 9.3.5 or older have also been affected by this Remotely code execution vulnerability. Similarly, the Apple TV devices which are running TV OS version 7.2.2 or below are expected to be affected in all. It is also heard that all those devices running iOS 10 are all expected to be safe from BlueBorne.
4. Android
Android is believed to be the most affected by BlueBorne, because it is more popular because it is much more popular. According to the Armis, all Android versions are in the grip of BlueBorne and four such different vulnerabilities have been found which affect Android OS primarily. Two similar vulnerabilities that do the remote code execution are (CVE-2017-0781 and CVE-2017-0782), the same result is a information leak (CVE-2017-0785) and the last vulnerabilty is Man -in-The-Middle attack (CVE-2017-0783). Not only phones, but also Smartwatches, wearable which are based on Android wear, television and set-top-boxes which run on Android TV and many devices that have Blurtooth enabled and with that Android Use Os.
If you have an Android device then you can go to the Google Play Store and download the BlueBorne Vulnerability Scanner App and check your device. This app is designed by Armis for our security.
How to Protect Your Bluetooth Enabled Device from BlueBorne?
Well, if I talk about the Comprehensive and the threatning attack vector, I think BluBorne is the only attack that has attacked so many people in a very short time. That is why I thought why you should be told some such measures so that you can keep this problem away from you to a great extent. For this I want to give you some suggestions First of all, always remember that do not ever activate Bluetooth in your device without needing it.
After that always keep your device updated so that the latest security patches are always installed on your mobile. According to your operating system, I have written a few steps below that you will be able to follow it. And if you follow them you can save your device to such a great extent.
After that always keep your device updated so that the latest security patches are always installed on your mobile. According to your operating system, I have written a few steps below that you will be able to follow it. And if you follow them you can save your device to such a great extent.
1. Windows
Microsoft has released the security patch release of BlueBorne on July 11 and if you have installed it then it is good and if not, then update it now. With this you can keep you safe.
2. iOS
If you are using iOS 10 in your device then you are safe from any attack and if you are using older versions then this can be a concern for you.
3. Android
Google has also released BlueBorne fixes on August 7. These patches in September