connection Bluetooth It has very positive developments for users, such as ease of use and avoidance of intervening cables. Unfortunately, there is not always perfect security when using this or any other technological tool. An example of what we are saying is that a security advisory hole this would allow, among other things, to open the doors of cars using this interface.

It is important to note that the error only affects the following. Passive use of Bluetooth. In other words, you only need to be close to one device for the process to take place. It is not possible to activate in cases where an app or action must be used on a phone, or when the action is combined with the use of WiFi (for example, when unlocking Macs with an Apple Watch). cheat.

And where is it possible to exploit the failure detected by the NCCC Group? Well, in the options where functions are activated, like in cars, without going beyond unlocking or detecting the presence of a Bluetooth device. Consulting, without going further, demonstrated the effectiveness of the attack by launching and launching an attack. Tesla Model 3.

How does this Bluetooth hack work?

It is at a very low level relative to the transmitter’s radio, thus avoiding potential security detections in software layers or the like. Moreover, goes almost unnoticed when communicating wirelessly—because that’s basically what is needed to unlock it. As a result, it is possible to access the issuer’s information by being present by direct reading. The data can then be sent over the Internet wherever it is needed. Finally, if desired, it is possible to synchronize and imitate the unauthorized unlocking element.

Tesla Model 3 white


pexels

Do this, can’t find car or smart lock nothing to make you suspect and provides access to its regular use. This is because, being a passive element, it does not use an additional control option such as the hardware identifier present to open the door or start the car. Therefore use Bypasses existing Bluetooth communication protections right nowthe problematic one.

Is there any way to protect yourself?

Ideally, a two-stage approval systemlike a smartphone. Therefore, when the presence of the opened Bluetooth device is detected, a confirmation message should be received. If this can be detected, the vulnerability we mentioned will no longer function and will never be a problem.

Also, if it is possible to set up a recognition system, Location, the protection will be fully effective (with WiFi or GPS). Otherwise, we will have to wait for the measures to be taken by the manufacturers to eliminate this hole, which is not easy to implement for non-technologists.

Source: Cincodias Elpais

Previous articleThis is the Netflix email you look forward to seeing the content before everyone else.
Next articleFall Guys will be free and coming to Xbox and Switch in June this year
I am Bret Jackson, a professional journalist and author for Gadget Onus, where I specialize in writing about the gaming industry. With over 6 years of experience in my field, I have built up an extensive portfolio that ranges from reviews to interviews with top figures within the industry. My work has been featured on various news sites, providing readers with insightful analysis regarding the current state of gaming culture.

LEAVE A REPLY

Please enter your comment!
Please enter your name here