Bluesnarfing At CeBIT 2004 104
La^2 writes "The Austrian research company Salzburg Research did a field trial at the CeBIT 2004 that confirms the seriousness of the recently discovered bluetooth security loophole in the firmware of popular mobile phones. In this trial, 1269 unique bluetooth-enabled devices were discovered, and their vulnerability to the so-called SNARF attack checked. The report on this bluesnarfing at large scale has interesting statistics, which may not please some of the vendors." (And the CeBIT version of Knoppix was apparently being used to slurp up and display Bluetooth phone information, too.)
Just the good bits from .pdf (Score:5, Interesting)
3 Final Remarks
3.1 Proclaimer
The information gathered in this field trial will not be disclosed to anybody. Personal information that has been retrieved from vulnerable phones has been deleted. This study has been made for scientific demonstration purposes, only.
3.2 What has been done
The SNARF attack used at the CeBIT was intended to finish as fast as possible. That is why only the first 10 entries of each phone book were read out. About 50 numbers from each snarfed phone have been retrieved.
3.3 What could have been done
As mentioned in the introduction there could have been done a variety of different things with an unauthorized bluetooth connection to the phone. The following paragraphs give some ideas on the things this security flaw would also allow the attacker to do.
3.3.1 Sending a SMS
The only good way to get to know the number of the snarfed phone is to send an SMS from the attacked phone to another device. Depending on the manufacturer of the phone, SMS messages can either be provided in 7bit encoded ASCII-text and/or have to be provided as a SMS-PDU which is rather tricky to generate. For the creation of SMS-PDUs there is a tool called PDUSpy in the download section of http://www.nobby.com/.
Nokia phones allow to issue text-mode and PDU-mode messages to the device, while SonyEricsson phones (and also Siemens phones) only accept PDU-encoded SMS messages. The sending of an SMS is not visible to the user. Usually, the issued SMS is not stored in the sent-box of the snarfed phone. In rare cases, the SMS settings of the snarfed phone are set to require a report that is generated at the receiving phone. In this case the sender that was not aware of having sent a message would receive a reception-report from the attacker?s phone (which includes a phone number). By sending PDU encoded messages, it can be controlled by setting a flag whether a reception report is generated or not.
This method to get the victim?s phone number is causing costs to the holder of the phone. That is why it has not been done in the CeBIT field-trial. But it works for sure (at least on Nokia devices). It would also be possible to get the device?s phone number by initiating a phone call to the number of a phone that is able to display the caller?s number. However, this method would disclose the number of the dialed phone to the owner of the attacked phone, because every call initiation is writing an entry into the dialed contacts list (DC phone book).
3.3.2 Initiating a Phone Call
It is possible to initiate phone calls to virtually any other number. It would be very lucrative to initiate calls to a premium service number that is ran by the attacker. As mentioned before, dialed numbers are usually stored in the phone?s calling lists and are also stored at the provider-site for billing purposes. Therefore, this kind of abuse is rather unlikely. It would also be very very easy to find out and sue the person being responsible for this premium service.
3.3.3 Writing a Phone Book Entry
As mentioned before, every phone call is writing an entry into the ?dialed contacts? or DC phone book of the respective device. By writing a phone book entry into the DC phone book, the traces on the device that evidence that a call has been made can be replaced by any number. Since the operator also stores dialed numbers for billing purposes, this kind of obfuscation would only delay the process of finding the responsible person.
Of course it is also possible to do some nasty phone book entries. Just imagine an entry that has ?Darling? as a name and the number of a person you dislike. This owner of the phone could then get into some trouble with his/her spouse
3.4 Vendor Reac
I found a solution to Snarf (Score:5, Funny)
Retail applications (Score:5, Insightful)
Just post a little disclaimer in tiny print at the entrance.
Uh oh... (Score:2)
They're everywhere.....
Re:Retail applications (Score:2)
Entering a phone bluetooth enabled phone without permission, regardless of intent, is mostly "wrong".
Granted, one shouldn't leave a bluetooth wide open
*shrug* hopefully this experiment helps prove enough of a point to manufacturers to shore that up a bit, eh?
e.
this is as opposed to "bluesmurfing" (Score:5, Funny)
Yeah, but are they "toothing"? (Score:3, Interesting)
A rather interesting phenomenon.
Too bad I can't get into it
Re:Yeah, but are they "toothing"? (Score:2)
/greger
Re:Yeah, but are they "toothing"? (Score:1, Troll)
Bluesnarfing (Score:4, Informative)
I had to google for this one ...
Basically, Bluesnarfing is an exploit of a Bluetooth vulnerability to access data stored on the mobile device.
A more detailed explanation can be found here [geek.com]
Re:Bluesnarfing (Score:1)
Spammers (Score:5, Interesting)
Just a thought...
--D3X
Re:Spammers (Score:4, Interesting)
Re:Spammers (Score:2)
Is it possible to lock down Nokia and that one other company's Bluetooth phones to behave like the Siemens - ask permission?
Or better yet, ask for permission when a new device is detected, and subsequent connections from that same device are automatic?
(Disclaimer - I have never used a Bluetooth phone so I may be completely talking out of my ass.)
Re:Spammers (Score:2)
Re:Spammers (Score:3, Informative)
I think the point of bluesnarfing is exploiting a bug in the bluetooth stack that bypasses the discoverable mode requirement and the one time password pairing step.
Re:Spammers (Score:2)
The thing is when a phone I own sees someone else's laptop - I want the phone to make sure it has my permission.
Re:Spammers (Score:3, Insightful)
The evil cracker use of this is insane.. hell having hundreds of cellphones calling a dial in back door of a place you are trying to crack will hide your attacks quite well. and I am sure you can initiate a data call via bluetooth, so let's start cracking attempts or wardialing from unknowing bystanders.
All I know is that I am making damn sure my next phone does NOT have bluetooth. I can
Re:Spammers (Score:2, Informative)
What about Palm devices? (Score:5, Interesting)
And what about the USB Bluetooth devices for adding it to a PC? Are they vulnerable as well?
Re:What about Palm devices? (Score:3, Informative)
If you're interested, I'd suggest running some tests yourself - find some Palms with BT, try to get some data, and see if they ask the user first.
Today's security hacking lesson (Score:5, Insightful)
Publish vulnerablities with code examples proving it. WRONG!
Loudly hack everyone's security at a big trade show. CORRECT!
Re:Today's security hacking lesson (Score:5, Insightful)
It's +4 Insightful.
+5 would be:
Act as a lone citizen and Publish vulnerablities with code examples proving it. WRONG!
Make sure you're part of company with a team of lawyers and Loudly hack everyone's security at a big trade show. CORRECT!
Re:Today's security hacking lesson (Score:2, Interesting)
Anybody but Bush (Score:1)
The author of that article is involved in www.moveon.org. In case you didn't already know about it: maybe you're interested in signing up or volunteering?
Re:Today's security hacking lesson (Score:5, Interesting)
Loudly hacking the security at a trade show honestly seems like the only way to deal with this issue.
definition of snarf (Score:5, Funny)
Re:definition of snarf (Score:3, Funny)
If you hadn't put that in, I would have thought you were my brother posting!
Re:definition of snarf (Score:1)
Re:definition of snarf (Score:5, Funny)
Bring your dads along while you're at it.
Re:definition of snarf (Score:1)
Re:definition of snarf (Score:1)
Re:definition of snarf (Score:1)
Re:definition of snarf (Score:5, Funny)
Re:definition of snarf (Score:2)
Re:definition of snarf (Score:2)
Not as surprised as the grape.
Re:definition of snarf (Score:3, Funny)
Re:definition of snarf (Score:5, Funny)
Re:definition of snarf (Score:2)
orphange as in a citrus fruit that has lost
its mother?
Re:definition of snarf (Score:2)
This has been the definition of snarf in the circles I've seen, spanning at least 3 states (SC, MI, and OH) and it never had anything to do with bicycles or the bathtub; unless, of course, those happened to be the topics which caused the snarf.
Interesting alternate definition though...
Re:definition of snarf (Score:2, Funny)
Re:definition of snarf (Score:2)
I bet this is why you are constantly being told you talk too much while having sex.
Re:definition of snarf (Score:1)
Re:definition of snarf (Score:2)
I've never actually seen anyone do it. Is this what deviants did for fun before hidden webcams were readily available?
Re:definition of snarf (Score:1)
wifflesnoofer -> snoofer -> snoof -> snarf
?
And for some reason to me, a bicycle-seat-sniffer seems to be much more deviant than a webcam-voyeur. Or maybe we as a generation are just more deviant but only online...
Re:definition of snarf (Score:2)
There's something really creepy about a person getting off watching you use the bathroom from cameras hidden in strange places.
Re:definition of snarf (Score:2)
well, you see... (Score:3, Funny)
obviously bluetooth devices aren't packaged with enough care instructions.
Re:well, you see... (Score:2)
the first King to unify Denmark.
He had a blue tooth.
Re:well, you see... (Score:2)
which is an ailment caused by excessive flouride
consumption.
foo! (Score:4, Interesting)
Re:foo! (Score:4, Interesting)
So why not do it when they're in a meeting, and just start listening? Voila, one infinity bug in a mobile phone.
Make their phone dial a call-box if you like.
getting busted for this? (Score:2)
In other news, check out my artist interview at Fulcrum gallery [fulcrumgallery.com].
Re:getting busted for this? (Score:1)
SNARF quest? (Score:1)
What shall we do tomorrow, Brain? (Score:2, Funny)
The same thing we do every night, Pinky, Try to take over the WORLD! [maniacal laughter]
Snarf!
snarfing -- who cares (Score:3, Interesting)
http://www.blueserker.com [blueserker.com]
Re:snarfing -- who cares (Score:3, Funny)
I was there with my Nokia 6600 (Score:3, Interesting)
It consumes too much power to keep it on anyway. Although it would be cool if CeBIT provided wireless internet access through Bluetooth througout the terrain. I know they did have an 802.11b network running last year, which was freely accessible to visitors.
One cool thing this year was the availibility of the CeBIT Mobile Fair Planner for Symbian-based phones. It was available for download on the CeBIT site [cebit.de] (altough access to it required free registration). No more thick guide to plough through in order to find the exhibitors you're looking for. An exhibitor list (including search functionality), interior maps of the buildings hosting the fair, everything in my phone!
It was the first time I actually felt myself living in the twentyfirst century.
Now I hope that Nokia will soon release a Bluesnarfing-proof firmware update for my phone.
The most interesting bit.... KNOPPIX 3.4! (Score:1, Informative)
Anyone have a torrent
Re:The most interesting bit.... KNOPPIX 3.4! (Score:1)
bluetooth keyboards? (Score:2)
I was considering getting a bluetooth keyboard since bluetooth is encyrpted unlike RF keyboards, but I'm a bit paranoid given all this bluesnarfing stuff.
Re:bluetooth keyboards? (Score:2, Informative)
Just for clarification of the Linux discussion (Score:2, Informative)
re: bugware (Score:2)
s/\./,/
The Possibilities are Endless (Score:1)
Even better idea. If you can get a connection to a couple of phones in the area, make the guy at table A's phone SMS the guy at table B's phone. Wait for the guy at table B to call A depending on the message, the results could be hilarious.
This makes Bluetooth headsets more useful (Score:1)
The article talked about sending a possibly traceable SMS to a device you own to discover the number of the snarfed phone. An untraceable way to discover the number would be to use a Bluetooth headset to make a call to one of those phone numbers that read back your phone number.
What fun you could have with a Linux PDA with Bluetooth combined with a Bluetooth headset. A nice and portable way to make unlimited free calls via any vulnerable phone that is close enough to you.
When will vendors learn that vul
In perspective (Score:3, Informative)
Re:In perspective (Score:1)
It is also stated that if these phones would have been longer within bt-coverage, the success-rate would have higher than 33%.
And you are right: Hopefully, the manufacturers are upgrading to a newer firmware version that is not vulnerable.