Millions of Bluetooth-enabled devices across the globe are vulnerable to a recently discovered security loophole in the Bluetooth technologies dubbed BlueBorne.
Although so far there has not been reported an incident of a BlueBorne attack being perpetrated, security experts argue that if the Bluetooth exploit can be used in a controlled lab. It is only a matter of time before the exploit falls into the wrong hands and hacking tools created and unleashed into the world.
What is BlueBorne?
Let us first start by understanding what it is and how it works. BlueBorne is a hybrid Trojan-Worm malware that uses Bluetooth connection to spread from device to device. Since it has the worm-properties, any device hosting this Trojan potentially becomes a carrier and will spread it around as the malware will actively search for any vulnerable hosts in the vicinity.
The most dangerous part about the BlueBorne, vulnerable hosts include any and all Bluetooth-enabled devices; be it Windows, Mac OSX, iOS, or Android devices. It is not device specific, as long as the device is Bluetooth enabled, BlueBorne and infiltrate, corrupt, and turn the device into another carrier.
The threat …read more