Bluetooth phones could leak data

Many of the most popular models of Bluetooth-enabled cell phones can be hacked easily, enabling a malicious hacker to steal phone books, images, calendar information, or virtually anything else stored on the phone, say a pair of security experts.

Adam Laurie, chief security officer and director of AL Digital and the Bunker, a secure Web hosting facility in Europe, and Martin Herfurt, a researcher at Salzburg Research, described the danger at a session Friday at the Defcon 12 conference in the US.

The pair demonstrated how software tools they created give them virtually total control over Bluetooth phones from a wide range of handset manufacturers, including Nokia, Sony Ericsson Mobile Communications, and TDK.

Widespread Vulnerabilities

Herfurt demonstrated three different ways to attack a phone: He could send unsolicited text messages to the phone's screen, download all the data stored on a phone (or manipulate the data on the phone itself), and turn the phone into a roaming bug by forcing a targeted phone to call another phone.

This last attack, which the pair call "BlueBugging," is potentially the most damaging because once the attacker initiates a call on the victim's phone, there's no need to stay within Bluetooth range, typically about 30 feet. The target need only be in a phone service area to be exploited.

This kind of attack could also be used to commit fraud, according to Laurie. For example, an attacker could force victims' phones to dial a phone service that bills the victim per call or per minute.

Increasingly, "phones are being used as portable data stores" for information such as passwords, PIN numbers, and other sensitive data, Laurie added--another danger if a phone can be hacked.

"Fifty to seventy percent of the phones we see are vulnerable" to at least one of the three types of hacking attacks, Laurie said. He said security researchers from computer security consulting firm @stake has further uncovered flaws in Bluetooth encryption, which could make the danger worse. Bluetooth adoption is growing, especially in Europe.

"If we can implement (@stake researcher) Ollie Whitehouse's cracks, any Bluetooth phone would be vulnerable," Laurie said.

Vulnerable by Default

Many users set their phones on what hackers call promiscuous mode in order to use Bluetooth accessories, such as headsets, but carelessly leave it in that mode, he noted. Also, many manufacturers set promiscuous mode as the default, to help customers quickly and easily connect accessories or devices.

Data theft using Bluetooth is especially hazardous because "you don't have to be visible to the person you're targeting," Laurie said. He found that he could connect to many Bluetooth devices well beyond the usual range of the wireless technology: Using just a small dongle on his laptop increased the range to about 40 meters, and some high-gain antennas could stretch communications to 90 meters.

The pair tested the data theft portion of their research only on phones they owned, for legal reasons.

In their Defcon presentation, demonstrating how to steal a phone book, they connected to a Nokia phone that briefly displayed a telltale message on screen but made no sound. If the owner isn't looking at the phone's screen at the moment an attacker connects, it probably won't be apparent that the phone is compromised.

In the Field

Several handset manufacturers dismissed his claims as far-fetched, which prompted him to do field research, Laurie said.

In one experiment, he ran his original Bluetooth intrusion program on his laptop while standing on the platform of a London Underground subway station during rush hour. He detected 336 Bluetooth-enabled phones, and deemed 77 of them "definitely vulnerable" to one or more of the attack methods. Laurie deemed a phone vulnerable if he was able to recognize the phone's default Bluetooth name, which a user can change.

Later, he conducted the same experiment inside the British Houses of Parliament. His laptop was X-rayed at security checkpoints, but he then wandered through the halls of government and discovered four vulnerable phones within 14 minutes.

Phone manufacturers have a duty both to their customers and -- with public companies -- to shareholders to make a safe and secure product, Laurie said.

"Manufacturers who knowingly ship phones with problems have broken their fiduciary duty by doing so," Laurie added.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Andrew Brandt

PC World
Show Comments

Father’s Day Gift Guide

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?