A few days ago Armis Labs discovered a new attack vector risking leading phones, personal computers, and IoT operating systems, which includes Android, iOS, Windows, and Linux along with the gadgets utilizing them. This newly identified vector labeled as ‘BlueBorne’ since it attacks the device through the air (airborne) through Bluetooth.They have furthermore revealed that eight relevant zero-day vulnerabilities, four of them are categorized as critical.
BlueBorne will be used by attackers to take over devices, gain access to private and corporate networks and data files, pass through secured networks, and thus multiply the attack to adjoining devices. Armis have already reported this threat to the responsible officials and is working along with them as software fixes are now being found and distributed.
Senior anti-virus expert of Kaspersky Lab Vitaly Kamluk stated that
“Bluetooth strikes like the latest set of attack vectors named Blueborne rely on the simple accessibility to the Bluetooth device near physical range. Whatever the security features incorporated in your device, the simple solution to stop attackers from taking advantage of your gadget is to turn off your device’s Bluetooth function when you’re not making use of it, not just setting it into a hidden or undetectable mode, but entirely switching it off.”
Innovative technologies like Bluetooth were incorporate with safety precautions, Though, challenges of the technology over time results in impending flaws in the code done by human coders which can be misused by the attackers, This has been proved by the researchers. The Latest edition of vulnerabilities in Bluetooth heap includes a number of vulnerabilities for chosen platforms and the range of unidentified and unreported vulnerabilities is often much bigger, which is the reason why we prefer to alert all people using the Bluetooth supported gadgets.