23 September 2017

WIRELESS ATTACKS > 5.3 Billion Devices Affected

Exploit Released for Critical BlueBorne Vulnerability that Reveals Nearly All Connected Device
By Gurubaran
Before a week security experts from Armis Labs revealed a new attack BlueBorne that affects Nearly All Connected Device. Simply to say if you are having Bluetooth enabled devices then you are vulnerable to BlueBorne attack.

Read More >>
Vulnerability Puts More Than 5 Billion Bluetooth Enabled Devices Under Attack
 
Affected Devices – BlueBorne
All the Bluetooth devices mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux are vulnerable.
 
 
 
 
 
 


> Android
All Android Devices Phones, tablets, wearables are affected, some of the example devices.
  • Google Pixel
  • Samsung Galaxy
  • Samsung Galaxy Tab
  • LG Watch Sport
  • Pumpkin Car Audio System
> Windows
All the windows version Since Windows Vista are infected and Microsoft issued a patch for it on July 11, 2017.
 
> Linux
All Linux running BlueZ are affected with information Leakage and version 3.3-rc1 with remote code Execution. Example devices
  • Samsung Gear S3 (Smartwatch)
  • Samsung Smart TVs
  • Samsung Family Hub (Smart refrigerator)
> iOS
All the devices with iPhone and iPad devices less than version iOS 9.3.5 are affected and the issue fixed with iOS 10.And AppleTV with version 7.2.2 and lower are affected.
 
Exploit – BlueBorne
Exploit released by user ojasookert in GitHub.
Now you can exploit your Android Devices for vulnerability CVE-2017-0785.
We should have Prerequisites installed Package: libbluetooth-dev to use BlueZ Linux Bluetooth stack.
 
 
sudo apt-get install bluetooth libbluetooth-dev
sudo pip install pybluez
sudo pip install pwntools
You can use Blueborne Android Scanner to scan for blueborne-vulnerable Android devices. Once you have found the device and have prerequisites installed you can launch the attack by typing following command.
python CVE-2017-0785.py TARGET=XX:XX:XX:XX:XX:XX
Before Performing this Test, make sure Bluetooth has Turned On and visible with your Target Device.

Blueborne bluetooth virus/malware!!How to stay protected???
Published on Sep 14, 2017
 
 
 
 
 
 
 
App to check: https://play.google.com/store/apps/de...

What is BlueBorne?
It is endangers major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux, and the devices using them. It can spread through the air (airborne) and attacks devices via Bluetooth. Armis has also disclosed eight related zero-day vulnerabilities, three of which are classified as critical. BlueBorne allows attackers to take control of devices, access corporate data and networks, penetrate secure “air-gapped” networks, and spread malware laterally to adjacent devices.

More about BlueBorne: https://armis.com/blueborne/

THANKS FOR WATCHING..


Defences
  • Disable Bluetooth as soon as you complete the process, turn it on only when it is required.
  • Now Android users can check their devices and device around them for vulnerability with the app BlueBorne Detector.
 
Gurubaran is a PKI Security Engineer at COMODO Security Inc. Certified Ethical Hacker, Penetration Tester, Security blogger, Co-Founder & Author of GBHackers On Security.
 





 
 
 
 
 
Link > https://gbhackers.com/exploit-released-blueborne/

No comments:

HERE TO PROVE ANYTHING CAN HAPPEN: Meme Coins Explained: Hype, Risk, and Profit!

   Finbold 14 hours ago Search inside image Dogecoin Whales move funds into this emerging AI Altcoin Expecting a 9,303% rally by January 202...