CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

Researchers Find Bluetooth Signals Can be Fingerprinted to Track Smartphones

admin by admin
June 11, 2022
in Information Security
Share on FacebookShare on Twitter


A new research undertaken by a group of academics from the University of California San Diego has revealed for the first time that Bluetooth signals can be fingerprinted to track smartphones (and therefore, individuals).

The identification, at its core, hinges on imperfections in the Bluetooth chipset hardware introduced during the manufacturing process, resulting in a “unique physical-layer fingerprint.”

“To perform a physical-layer fingerprinting attack, the attacker must be equipped with a Software Defined Radio sniffer: a radio receiver capable of recording raw IQ radio signals,” the researchers said in a new paper titled “Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices.”

CyberSecurity

The attack is made possible due to the ubiquitous nature of Bluetooth Low Energy (BLE) beacons that are continuously transmitted by modern devices to enable crucial functions such as contact tracing during public health emergencies.

The hardware defects, on the other hand, stem from the fact that both Wi-Fi and BLE components are often integrated together into a specialized “combo chip,” effectively subjecting Bluetooth to the same set of metrics that can be used to uniquely fingerprint Wi-Fi devices: carrier frequency offset and IQ imbalance.

Fingerprinting and tracking a device then entails extracting CFO and I/Q imperfections for each packet by computing the Mahalanobis distance to determine “how close the features of the new packet” are to its previously recorded hardware imperfection fingerprint.

“Also, since BLE devices have temporarily stable identifiers in their packets [i.e., MAC address], we can identify a device based on the average over multiple packets, increasing identification accuracy,” the researchers said.

CyberSecurity

That said, there are several challenges to pulling off such an attack in an adversarial setting, chief among them being that the ability to uniquely identify a device depends on the BLE chipset used as well as the chipsets of other devices that are in close physical proximity to the target.

Other critical factors that could affect the readings include device temperature, differences in BLE transmit power between iPhone and Android devices, and the quality of the sniffer radio used by the malicious actor to execute the fingerprinting attacks.

“By evaluating the practicality of this attack in the field, particularly in busy settings such as coffee shops, we found that certain devices have unique fingerprints, and therefore are particularly vulnerable to tracking attacks, others have common fingerprints, they will often be misidentified,” the researchers concluded.

“BLE does present a location tracking threat for mobile devices. However an attacker’s ability to track a particular target is essentially a matter of luck.”





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
Previous Post

Adconion Execs Plead Guilty in Federal Anti-Spam Case – Krebs on Security

Next Post

Getting Started: 25 Core Functions of a CMDB

Related Posts

Information Security

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

by admin
June 24, 2022
Information Security

ToddyCat claws at Asian governments

by admin
June 24, 2022
Information Security

NSO Confirms Pegasus Spyware Used by at least 5 European Countries

by admin
June 23, 2022
Information Security

AWS re:Inforce 2022: Threat detection and incident response track preview

by admin
June 23, 2022
Information Security

Vishing scams on the rise: How to protect yourself

by admin
June 23, 2022
Next Post

Getting Started: 25 Core Functions of a CMDB

Leave Comment

Recommended

“We Need to Get Better”: How CIOs Are Working to Extract More Value from EHRs

June 25, 2022

Innerframeworkforblance

June 25, 2022

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

June 24, 2022

ToddyCat claws at Asian governments

June 24, 2022

“People Are What Makes Tech Work”: Lee Milligan Reflects on His Journey at Asante

June 24, 2022

Innercapabiltyconnectivity

June 24, 2022

© 2022 CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.