{"id":9452,"date":"2017-09-21T16:40:35","date_gmt":"2017-09-22T00:40:35","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/09\/21\/news-3225\/"},"modified":"2017-09-21T16:40:35","modified_gmt":"2017-09-22T00:40:35","slug":"news-3225","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/09\/21\/news-3225\/","title":{"rendered":"BlueBorne: Technical Insight"},"content":{"rendered":"<p><strong>Credit to Author: Axelle Apvrille| Date: Tue, 19 Sep 2017 17:30:59 +0000<\/strong><\/p>\n<div class=\"entry\">\n<p id=\"blueborne-technical-insight\"><em>(BlueBorne background: read our previous post from Aamir Lakhani <a href=\"http:\/\/blog.fortinet.com\/2017\/09\/14\/blueborne-may-affect-billions-of-bluetooth-devices\">here<\/a>)<\/em><\/p>\n<p>I have watched the&nbsp;<a href=\"https:\/\/www.armis.com\/blueborne\/\">BlueBorne demos<\/a>&nbsp;and read the&nbsp;<a href=\"http:\/\/go.armis.com\/hubfs\/BlueBorne%20Technical%20White%20Paper-1.pdf?t=1505319664351\">technical paper<\/a>&nbsp;&#8211; it was tough! I am amazed at how the researchers managed to exploit several vulnerabilities to turn them into a PoC attack. My comments below.<\/p>\n<h3 id=\"blueborne-does-not-spread-as-such\">BlueBorne does not &quot;spread&quot; (as such)<\/h3>\n<p>BlueBorne&nbsp;<em>affects<\/em>&nbsp;devices supporting Bluetooth. As such, the PoC they demoed&nbsp;<strong>does not spread<\/strong>&nbsp;over Bluetooth: it takes control of a given Bluetooth victim. Apparently, the&nbsp;<a href=\"http:\/\/thehackernews.com\/2017\/09\/blueborne-bluetooth-hacking.html\">researchers said they locally created a botnet<\/a>. But that was clearly a local inside test, and we have no details regarding the botnet&#39;s payload.<\/p>\n<h3 id=\"do-you-remember-symboscabir-2004\">Do you remember SymbOS\/Cabir (2004)?<\/h3>\n<p><strong>We&#39;ve already had Bluetooth worms<\/strong>. The first case was&nbsp;<a href=\"http:\/\/www.fortiguardcenter.com\/encyclopedia\/virus\/7334\/symbos-cabir-a-worm\">Cabir<\/a>, a Bluetooth worm PoC affecting Symbian OS phones. Then there was&nbsp;<a href=\"http:\/\/www.fortiguardcenter.com\/encyclopedia\/virus\/365298\/symbos-comwar-v10-worm\">CommWarrior<\/a>&nbsp;in 2005, and&nbsp;<a href=\"http:\/\/www.fortiguardcenter.com\/encyclopedia\/virus\/417172\/symbos-beselo-a-worm\">BeSeLo<\/a>&nbsp;in 2008 which spread over Bluetooth and MMS.<\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" src=\".\/comwar.jpg\" \/><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/comwar.jpg\" style=\"width: 176px; height: 208px;\" \/><\/p>\n<h3 id=\"the-bluetooth-worm-did-not-spread-well-in-2004-2008-but-it-may-be-different-now\">The Bluetooth worm did not spread well in 2004-2008, but it may be different now<\/h3>\n<p><strong>CommWarrior spread quite massively<\/strong>&nbsp;with&nbsp;<a href=\"https:\/\/securelist.com\/malware-evolution-january-march-2008\/36208\/\">well over 100,000 infections<\/a>&nbsp;&#8211; and this was particularly high for those times. However, the truth is that&nbsp;<strong>the worm spread via MMS<\/strong>&nbsp;rather than via Bluetooth.<\/p>\n<p>At that time, there were two limitations to propagation via Bluetooth:<\/p>\n<ol>\n<li>\n<p><strong>Short range<\/strong>. Bluetooth&#39;s range typically does not exceed 10 meters. You cannot infect another device beyond that range.<\/p>\n<\/li>\n<li>\n<p><strong>Few Bluetooth devices<\/strong>. In 2005, there weren&#39;t that many smartphones supporting Bluetooth, and far less IoT.<\/p>\n<\/li>\n<\/ol>\n<p>Although the first point still stands today, the second no longer does. There are undoubtely far more Bluetooth devices.<\/p>\n<p>Yet, now that Bluetooth Low Energy (BLE) is being adopted more and more &#8211; especially for IoT where consumption matters a lot &#8211; I doubt a Bluetooth worm would ever reach the propagation rates of malware such as WannaCry (<a href=\"https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/threat-reports\/Fortinet-Threat-Report-Q2-2017.pdf\">see Fortiguard&#39;s Threat Report Q2: WannaCry 25 million hits per day<\/a>). For a reminder, despite similar names,&nbsp;<strong>BLE<\/strong>&nbsp;is different from Bluetooth and&nbsp;<strong>not affected by BlueBorne<\/strong>.<\/p>\n<h3 id=\"what-does-the-blueborne-app-do\">What does the BlueBorne app do?<\/h3>\n<p>The researchers published an&nbsp;<a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.armis.blueborne_detector\">Android app<\/a>&nbsp;to test the vulnerability of your smartphone. It also features a mode where you can scan nearby devices to assess their risk level.<\/p>\n<p>I have analyzed the app and confirm it is not malicious. Good \ud83d\ude42 I ran it in our lab. See the screenshot below. Note how many devices it picked up! But&nbsp;<strong>most of those green dots are BLE devices<\/strong>.<\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" src=\".\/blueborne-jet.png\" \/><img decoding=\"async\" alt=\"\" src=\"https:\/\/d3gpjj9d20n0p3.cloudfront.net\/ngblog\/uploads\/files\/blueborne-jet.png\" style=\"width: 300px; height: 533px;\" \/><\/p>\n<p><em>BlueBorne app picked up my BLE smart glasses (not affected) \ud83d\ude09<\/em><\/p>\n<p>The vulnerability test is a bit disappointing though: if I am correct, it only&nbsp;<strong>tests that the latest security patch date is after Aug 1, 2017<\/strong>(which is probably the date a patch was released for this).<\/p>\n<pre>  <code> public static boolean isVulnerable() {          boolean vulnerable = false;          if(Build$VERSION.SDK_INT &gt;= 17) {          \/\/ Gets system property \"ro.build.version.security_patch\"                 Date patchdate = VulnerabilityUtils.getSecurityPatchDate();                    \/\/ SAFE_DATE is: new GregorianCalendar(2017, 8, 1).getTime();              if(patchdate != null &amp;&amp; !patchdate.before(VulnerabilityUtils.SAFE_DATE)) {                    return vulnerable;              }                vulnerable = true;          }            return vulnerable;      }<\/code><\/pre>\n<p>I would have expected the app to test to see if Bluetooth was enabled, and perhaps even test for an exact vulnerability to some issues. The app does test for Bluetooth availability but only in the nearby scanning mode, not when you check your own device. Strange.<\/p>\n<p>&#8212; the Crypto Girl<\/p>\n<\/div<br \/><a href=\"https:\/\/blog.fortinet.com\/2017\/09\/19\/blueborne-technical-insight\" target=\"bwo\" >https:\/\/blog.fortinet.com\/feed<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\".\/comwar.jpg\"\/><\/p>\n<p><strong>Credit to Author: Axelle Apvrille| Date: Tue, 19 Sep 2017 17:30:59 +0000<\/strong><\/p>\n<p>BlueBorne\u00a0affects\u00a0devices supporting Bluetooth. As such, the PoC they demoed\u00a0does not spread\u00a0over Bluetooth: it takes control of a given Bluetooth victim. Apparently, the\u00a0researchers said they locally created a botnet. But that was clearly a local inside test, and we have no details regarding the botnet&#039;s payload.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10424,10378],"tags":[],"class_list":["post-9452","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9452"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9452\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9452"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}