Send you a kit to prevent Bluetooth headsets from being "turned against"
Release time:
2022-01-10
Similar to most wireless technologies, Bluetooth communication is also susceptible to various security threats. Small smart terminals may have security vulnerabilities, Bluetooth headsets may also have, but we do not pay enough attention to it. Yan Huaizhi Director, Institute of Computer Network Countermeasure, Beijing Institute of Technology The Bluetooth headset you wear every day may be tracked by location?
Similar to most wireless technologies, Bluetooth communication is also susceptible to various security threats. Small smart terminals may have security vulnerabilities, Bluetooth headsets may also have, but we do not pay enough attention to it.
Yan Huaizhi
Director, Institute of Computer Network Countermeasure, Beijing Institute of Technology
The Bluetooth headset you wear every day may be tracked by location?
Recently, it has been reported that some Bluetooth headsets have security vulnerabilities, which can be quickly implanted into code with positioning function by criminals, so as to realize remote tracking and even monitoring. This topic quickly boarded the Weibo hot search list, and many netizens exclaimed that there was a "stealth spy" lurking around them ". So, "Bluetooth headset into a locator, monitor" is alarmist, or is it true? Science and Technology Daily reporter interviewed the Beijing Institute of Technology Institute of computer network confrontation director Yan Huaizhi.
The problem of technology loopholes has been ignored for a long time.
"From the perspective of scientific and technological principles, Bluetooth headsets do exist the possibility of being monitored and tracked." Yan Huaizhi introduction, the so-called Bluetooth headset, usually refers to the use of Bluetooth technology wireless headset. Since the invention of Bluetooth technology in 1994, after nearly 30 years of development, it has now evolved to the fifth-generation Bluetooth 5 era.
"From the perspective of Bluetooth communication principle, Bluetooth devices usually include a Bluetooth module and a Bluetooth radio and software that supports connection. Bluetooth devices need to be paired before realizing communication functions." Yan Huaizhi said that the communication between devices is carried out in a short-range temporary network (piconet) based on Bluetooth technology connection, which can usually support 2 to 8 devices to implement the connection.
The Bluetooth headset applies the Bluetooth technology to the hands-free headset, so that the user can avoid the inconvenience and annoyance caused by the wired connection of the headset, thereby realizing a more relaxed call.
For a long time, while people enjoy the convenience brought by Bluetooth devices such as Bluetooth headsets, they often ignore the security issues of Bluetooth devices. "Similar to most wireless technologies, Bluetooth communication is also vulnerable to various security threats." Yan Huaizhi explained that this is because Bluetooth devices contain a variety of chipsets, operating systems and physical device configurations, including a large number of security programming interfaces, default settings, etc. Sparrow is small but complete, and some Bluetooth devices are as complex as a small smart terminal.
"Bluetooth headsets may also have security vulnerabilities in small smart terminals, but we don't pay enough attention to them." Yan Huaizhi said.
For example, he said, when the Bluetooth headset is paired for the first time, the user is required to use a PIN code (personal identification number) verification, which is usually composed of 4 to 6 digits. During verification, the Bluetooth machine automatically uses its own encryption algorithm to encrypt the code, and then transmits it to the target device for identity authentication. In this process, the attacker may intercept the Bluetooth communication data packet, and then pretend to be the target device to connect, or use brute force attacks to crack the PIN code, and then break the Bluetooth headset system.
In addition, an attacker may scan and pair with a Bluetooth headset while it is waiting to be paired, and then easily implant malicious code.
After the attacker breaks through the Bluetooth headset system through the Bluetooth headset vulnerability or the use of communication hijacking and other pipelines, he can quickly implant malicious code that can realize the monitoring or positioning function, and then obtain the location information of the Bluetooth headset through the pipeline of the short-range monitoring service or the use of related equipment at short range, thus realizing the monitoring or positioning tracking of the Bluetooth headset. If the attacker uses the network to spread the location information, it can even achieve arbitrary long-distance location tracking.