Author |
bluejacking and now bluesnarfing |
chungagoring Joined: Jul 25, 2002 Posts: > 500 From: Madrid, Spain PM, WWW
|
http://news.zdnet.co.uk/communications/wireless/0,39020348,39145881,00.htm
and for wappers. it looks like a new way of bluejacking with ftp bluetooth profile enabled phones lets you browse the inner folder/file structure of any bluetooth device, and this way you can actually "steal" ringtones, images... and contacts.
"
A serious Bluetooth security vulnerability allows mobile phone users' contact books to be stolen. You've heard of bluejacking - now meet 'bluesnarfing'
A security flaw has been discovered in Bluetooth that lets an attacker download all contact details along with other information from a vulnerable phone, while leaving no trace of the attack.
Unlike bluejacking, which is where users can send a message to Bluetooth phones without authorisation, this latest discovery for the wireless-data standard allows data, such as telephone numbers and diary entries, stored in a vulnerable device to be stolen by the attacker. The new exploit is called bluesnarfing.
Bluesnarfing is said to affect a number of Sony Ericsson, Ericsson and Nokia handsets, but some models are at greater risk because they invite attack even when in 'invisible mode' -- in which the handset is not supposed to broadcast its identity and should refuse connections from other Bluetooth devices.
(...)
"
_________________
luiscamino.com
luis gonzalez-camino calleja a.k.a. luiscamino in other forums
clubsonyericsson.com
[ This Message was edited by: chungagoring on 2004-02-09 21:01 ] |
|
vanquish Joined: Mar 20, 2003 Posts: > 500 From: Wor Newcastle Phone: V600i PM, WWW
|
stupid bloody name
how about stealing people phone books
bluesnarfing pah!
piece of shit
_________________
Home sweet home
[ This Message was edited by: daredeviluk on 2004-02-09 21:04 ] |
kev.morris Joined: Jul 02, 2003 Posts: 291 From: Derbyshire, England PM |
i just read this 10 mins ago and thought it was a silly name. which se phones are effected? and how do you do it???
This message was posted from a P900 |
MikLSP Joined: Sep 21, 2003 Posts: > 500 From: se-nse.com PM |
Hardly time to run for the hills.
People are quite welcome to my ringtones etc. As for contacts, what they gonna do, ring them to death?! So what.
I also doubt any phones are discoverable when BT is turned off. It's hard enough findin a device when it's on!
Oh and, Yeah it is a silly name
|
gelfen Joined: Nov 22, 2003 Posts: > 500 From: Melbourne, Australia PM |
*and some more info*
from ZDNet Australia
Nokia: Bluetooth flaw gnaws at phone security
By Munir Kotadia, ZDNet UK
10 February 2004
Nokia has confirmed that some of its Bluetooth-enabled mobile phones are vulnerable to "bluesnarfing," in which an attacker exploits a flaw to read, modify and copy a phone's address book and calendar without leaving any trace of the intrusion.
Networking and security company AL Digital said on Monday that it had discovered a security flaw in Bluetooth, a wireless data standard, that could allow such an attack. The flaw affects a number of Sony Ericsson, Ericsson and Nokia handsets, but some models--including a handful of Nokia phones--are at greater risk because they invite attack even when in "invisible mode," according to AL Digital.
A Nokia representative told ZDNet UK that the Finnish device maker is aware of "security issues" relating to devices with Bluetooth that "(make) it possible to download and modify phone book, calendar and other information on the phone without the owner's knowledge or consent, if Bluetooth is turned on."
However, the representative said the attack was possible only if the phone was in "visible" mode, or when it is set to actively search for other Bluetooth devices. Nokia said that a bluesnarf attack "may happen in public places, if a device is in the visible mode and the Bluetooth functionality is switched on. The phones vulnerable to 'snarf' attack include the Nokia 6310, 6310i, 8910 and 8910i phones as well as devices from another manufacturer."
According to Nokia, if an attacker had physical access to a 7650 model, a bluesnarf attack would not only be possible, but it would also allow the attacker's Bluetooth device to "read the data on the attacked device and also send SMS messages and browse the Web via it."
The company said it had not been able to recreate this backdoor attack on the 6310 handset, and would not confirm if other models were vulnerable to it.
Nokia also said that its 6310i handset is vulnerable to a denial-of-service attack when it receives a "corrupted" Bluetooth message: "A DoS attack would happen if a malicious party sends a malformated Bluetooth...message to reboot a victim's Nokia 6310i. We have repeated the attacks and found that there are some corrupted Bluetooth messages that could crash the Nokia 6310i phone," said the representative, who sought to reassure customers by saying that following the crash, the phone will reset and function normally.
A Sony Ericsson representative told ZDNet UK the company is "looking into" the matter and expected to make a statement on Tuesday.
Handsets at risk
England-based AL Digital said that the risk of a bluesnarf attack was highest for the four phone models listed by Nokia. Some models were described as more vulnerable than others in invisible mode, in which the handset is not supposed to broadcast its identity and should refuse connections from other Bluetooth devices.
"On some models of phone, you are only vulnerable to attack if you are on visible mode; however, there are other models of phones where you are vulnerable even in nonvisible mode," said Adam Laurie, chief security officer at AL Digital.
AL Digital has developed several proof-of-concept utilities, but has not released them, Laurie said. The utilities include Bluestumbler, designed to monitor and log all visible Bluetooth devices (name, MAC address, signal strength, capabilities), and identify the manufacturer from MAC address lookup; and Bluesnarf, which can copy data from a target device.
According to AL Digital's Bluestumbler Web site, vulnerable phones include: Ericsson T68; Sony Ericsson R520m, T68i, T610 and Z1010; and Nokia 6310, 6310i, 7650, 8910 and 8910i.
Laurie said he discovered the problem when he was asked to test how safe Bluetooth devices actually were. "Before we deploy any new technology for clients or our own staff, one of my duties is to investigate that technology and ensure it is secure--actually rolling your sleeves up and looking at it, not just taking the manufacturers' claims at face value. When I did that, I found that it is not secure," he said.
According to Laurie, he can initiate a bluesnarfing attack from his laptop after making a modification to its Bluetooth settings. "It is a standard Bluetooth-enabled laptop, and the only special bit is the software I am using in the Bluetooth stack. I have a modified the Bluetooth stack, and that enables me to perform this attack," he said.
Bluesnarfing has huge potential for abuse because it leaves no trace and victims will be unaware that their details have been stolen, Laurie said. "If your phone is in your pocket, you will be completely unaware."
Although the problem may affect other Bluetooth devices, such as laptops, Laurie said they are more difficult to target because the systems are more complex. "(Mobile phones) are liable to be more vulnerable simply because the resources for menus and configuration are limited. Manufacturers try and make Bluetooth simple to use on phones, so you don't have much granularity in setting options. On a lot of phones, Bluetooth is either on or off," he said.
Laurie said that for now, there is no fix available. He said that the only way to be completely safe is to switch off the Bluetooth functionality.
Nokia will not be releasing a fix for its devices in the near future because the attacks are limited to "only a few models" and it does not expect them to "happen at large," the Nokia representative said. The company is advising customers in public places to set their phones to invisible or switch the Bluetooth functionality off.
"In public places, where the above-mentioned devices with Bluetooth technology might be targets of malicious attacks--at least in theory--the safest way to prevent hackers is to set the device in nondiscoverable mode--'hidden'--or switch off the Bluetooth functionality. This does not affect other functionalities of the phone," the Nokia representative said.
_________________
Gee, does that beat me? I only got two pair - two aces, and another two.
[ This Message was edited by: gelfen on 2004-02-10 01:59 ] |
QooQooJiao Joined: Jan 04, 2003 Posts: 15 PM |
i think T610 is the easiest to bluejack. Not so with Nokia fones. always OBEX errors.
|
rdnymllnsktr Joined: Feb 04, 2004 Posts: > 500 From: California, but now in Plano, PM, WWW
|
Dude, are you dumb? Nokia's are the EASIEST TO BLUEJACK!!! Nokia's don't have an option to keep the bluetooth on, but not visible. Nokia's can be bluejacked the easiest!
MyPhoneExplorer is the new FMA!  http://www.fjsoft.at/en/downloads.php |
energetic Joined: Jan 13, 2003 Posts: > 500 From: Athens, Greece, Europe, Earth, PM, WWW
|
This is not good at all. I wouldnt want someone to mess with my phone contents. I mean what is next now? Bluevirus? Thinks will not be the same from now on. What if someone removes important/vital files of your mobile and then stop working?
This is very bad!
|
shithappens Joined: Sep 17, 2002 Posts: > 500 From: Kuala Lumpur, Malaysia PM |
Quote:
|
On 2004-02-09 23:30:00, MikLSP wrote:
Hardly time to run for the hills.
People are quite welcome to my ringtones etc. As for contacts, what they gonna do, ring them to death?! So what.
Oh and, Yeah it is a silly name
|
|
True Bravery is arriving home late after a boys' nite out, wife waiting with the broom & u ask: "Are u still cleaning or are u flying somewhere" |
gelfen Joined: Nov 22, 2003 Posts: > 500 From: Melbourne, Australia PM |
Quote:
|
On 2004-02-10 08:17:15, energetic wrote:
This is not good at all. I wouldnt want someone to mess with my phone contents. I mean what is next now? Bluevirus? Thinks will not be the same from now on. What if someone removes important/vital files of your mobile and then stop working? |
|
likelihood is the security holes will be fixed in future firmware and phones. interesting that t6x0 series is listed as potentially vulnerable, but that z600 isn't. possibly slight differences in the pairing implementation, or just an oversight of the article?
still, you can't be snarffed if you don't have it on.
|
Vlammetje Joined: Mar 01, 2003 Posts: > 500 From: Den Haag PM, WWW
|
interesting how the t610 is 'vulnerable' but not the Z600 but then the Z1010 is??
nonsense..... as for bluevirus.... not too worried myself.
I dun have too many 'classified' info on my phone anyway... what are they gonna do?
|
energetic Joined: Jan 13, 2003 Posts: > 500 From: Athens, Greece, Europe, Earth, PM, WWW
|
Well I use the bluetooth only when I am in my car with my headset. Any other time I turn it off. That reduces a bit the risk.
That is what I want to believe anyway.
|
shithappens Joined: Sep 17, 2002 Posts: > 500 From: Kuala Lumpur, Malaysia PM |
sweet dreams to you then
True Bravery is arriving home late after a boys' nite out, wife waiting with the broom & u ask: "Are u still cleaning or are u flying somewhere" |
energetic Joined: Jan 13, 2003 Posts: > 500 From: Athens, Greece, Europe, Earth, PM, WWW
|
@shithappens
|
Vlammetje Joined: Mar 01, 2003 Posts: > 500 From: Den Haag PM, WWW
|
Well I have my on 24/7 and am always discoverable...... so what?
|
|
Access the forum with a mobile phone via esato.mobi
|