How shall I own your mobile phone today?

Bluesnarfing, bluejacking, bluebugging

  • alert
  • submit to reddit

Build a business case: developing custom apps

Comment It pains me to give this woman any more publicity, but Paris Hilton and her cracked cell phone, the Sidekick II, really woke a lot of people up. For those of you who recently returned from a stay in a monastary somewhere high up in the Himalayas, last month Paris Hilton had her Sidekick II hacked and the contents spread all over the Internet. We're talking some hot stuff here: private phone numbers of celebrities, childishly-written notes revealing all sorts of interesting personal and business details, and photos, including several nude pix (I'm not going to provide the link; just search Google and you'll be able to find everything).

[Note: Although there's still some question as to just how Paris Hilton's phone was compromised, it seems that the answer to her security question wasn't that hard to guess: "What is your favorite pet's name?" Anyone who knows anything about Paris knows about her little chihuahua, Tinkerbell.]

That's pretty bad. I mean, here's this famous person, and her phone gets brutally hacked and her whole life - and those of many others - is completely disrupted, and everyone knows all about it. What do you think happened when people found out? Was there an en masse switch away from the Sidekick II?

Of course not, silly! We're talking about your every day end users here. According to the gossip blog Gawker, after the Paris Hilton incident, sales of the Sidekick II skyrocketed in New York, selling out in many stores. That's right. People specifically wanted the same phone that had just been hacked. Why? Perhaps part of the reason was because a celebrity used it, I'm sure, but more because with the added publicity they now knew about all the cool features built in to the Sidekick II phone, like notes, photos, and the like.

As a window into the mind of your average Joe, this anecdote is priceless. It's a bit like hearing about the sinking of the Titanic, and then announcing that you're buying a ticket on an ocean liner since you just found out about cruises. It just goes to prove that ordinary people don't give a hoot about security (the fact that one-third of email users have clicked on links in spam, and one in ten have actually bought crap advertised in spam, only reinforces my assertion).

That's really not good considering the specific devices we're talking about here: modern cell phones, which have now morphed far beyond simple telephone devices into Personal Information Managers, cameras, and networking devices as well. If security pros tear their hair out now trying to safeguard users' computers, I predict we'll all be completely bald trying to manage the new super cell phones that everyone is going to have in a short time.

How shall I own your phone today?

There are just so many interesting attack vectors for cell phones. To start with, there's the obvious threat of physical theft. It's one thing for a thief to heft a desktop box out of your office building, and it's easier to grab a laptop, but even my Mom can sneak a cell phone out past your guards (and she'll be out of jail in just a few months, thank goodness... just kidding, Mom!).

As I've discussed before, you can set phones up so that they appear to be off, leave the phone behind - say, in a conference room - and then call the phone and imperceptibly turn on the speakerphone, allowing you to hear everything said while you're out of the room. Even criminals know about phones that go into "ghost" mode. Yes, there are solutions, but how many of you have them as a line item in your budget?

And then we have Bluetooth. I'm not going to begin declaring that the sky is falling, and that Bluetooth on cell phones means that we're all doomed. However, it would be imprudent not to evince some concern and fail to admit the obvious: Bluetooth can be a security hazard on some phones.

Just a few weeks ago, a security group calling themselves Flexilis made the news. One of their members stood next to the red carpet at the Academy Awards with a laptop and an antenna hidden in his backpack, and the results weren't exactly unsurprising: between 50 and 100 of the celebs were vulnerable to bluesnarfing (ignore the erroneous comparison the article makes between Paris Hilton and the Academy Awards - the techniques used in each situation are completely different).

This isn't the first time Bluetooth has been found to be problematic. The previous link contains a good overview of several ways to attack Bluetooth-enabled devices, including bluesnarfing, bluejacking, bluebugging (similar to the "ghost phone" issue I mentioned above), and the backdoor attack. For more info, also see http://www.thebunker.net/security/bluetooth.htm, which provides details and a list of vulnerable phones. And now that Bluetooth rifles effectively extend the range of the technology from about 33 feet to a full mile (!), things can only get more precarious. It would be worth your time to read these web pages and familiarize yourself with Bluetooth and its problems, as well as its advantages.

That's right: advantages. Bluetooth is ultra-cool, that's for sure. Automatically syncing phone contacts with computer contacts is undeniably attractive to the busy info worker on the go, and wireless headsets are also really nice. Bluetooth is just too useful to go away, but it's up to security pros to educate users about the dangers of Bluetooth-enabled cell phones and, in fact, non-Bluetooth phones as well. As cell phones grow even more ubiquitous (is that even possible?) and yet more powerful, people are going to store greater quantities of very valuable information on them, just as they grow potentially more accessible to bad guys. When it comes to cell phones, we're going to need to keep our eyes - and ears - on them constantly ... except when we're driving, of course.

Scott Granneman is a senior consultant for Bryan Consulting Inc. in St. Louis. He specializes in Internet Services and developing Web applications for corporate, educational, and institutional clients.

Copyright © 2004, SecurityFocus logo

Related stories

<Symbian Trojan attacks anti-virus protection
MMS virus discovered
Paris Hilton's Sidekick hacked
Dampig Trojan menaces Symbian mobiles
T-Mobile hacker pleads guilty
Users choke on mobile spam
Mobile virus epidemics: don't panic

Secure remote control for conventional and virtual desktops

More from The Register

next story
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Canadian ISP Shaw falls over with 'routing' sickness
How sure are you of cloud computing now?
Don't call it throttling: Ericsson 'priority' tech gives users their own slice of spectrum
Actually it's a nifty trick - at least you'll pay for what you get
Three floats Jolla in Hong Kong: Says Sailfish is '3rd option'
Network throws hat into ring with Linux-powered handsets
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
Ancient pager tech SMS: It works, it's fab, but wow, get a load of that incoming SPAM
Networks' main issue: they don't know how it works, says expert
Trans-Pacific: Google spaffs cash on FAST undersea packet-flinging
One of 6 backers for new 60 Tbps cable to hook US to Japan
Tech city types developing 'Google Glass for the blind' app
An app and service where other people 'see' for you
prev story


5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.