Feeds

How shall I own your mobile phone today?

Bluesnarfing, bluejacking, bluebugging

  • alert
  • submit to reddit

The essential guide to IT transformation

Comment It pains me to give this woman any more publicity, but Paris Hilton and her cracked cell phone, the Sidekick II, really woke a lot of people up. For those of you who recently returned from a stay in a monastary somewhere high up in the Himalayas, last month Paris Hilton had her Sidekick II hacked and the contents spread all over the Internet. We're talking some hot stuff here: private phone numbers of celebrities, childishly-written notes revealing all sorts of interesting personal and business details, and photos, including several nude pix (I'm not going to provide the link; just search Google and you'll be able to find everything).

[Note: Although there's still some question as to just how Paris Hilton's phone was compromised, it seems that the answer to her security question wasn't that hard to guess: "What is your favorite pet's name?" Anyone who knows anything about Paris knows about her little chihuahua, Tinkerbell.]

That's pretty bad. I mean, here's this famous person, and her phone gets brutally hacked and her whole life - and those of many others - is completely disrupted, and everyone knows all about it. What do you think happened when people found out? Was there an en masse switch away from the Sidekick II?

Of course not, silly! We're talking about your every day end users here. According to the gossip blog Gawker, after the Paris Hilton incident, sales of the Sidekick II skyrocketed in New York, selling out in many stores. That's right. People specifically wanted the same phone that had just been hacked. Why? Perhaps part of the reason was because a celebrity used it, I'm sure, but more because with the added publicity they now knew about all the cool features built in to the Sidekick II phone, like notes, photos, and the like.

As a window into the mind of your average Joe, this anecdote is priceless. It's a bit like hearing about the sinking of the Titanic, and then announcing that you're buying a ticket on an ocean liner since you just found out about cruises. It just goes to prove that ordinary people don't give a hoot about security (the fact that one-third of email users have clicked on links in spam, and one in ten have actually bought crap advertised in spam, only reinforces my assertion).

That's really not good considering the specific devices we're talking about here: modern cell phones, which have now morphed far beyond simple telephone devices into Personal Information Managers, cameras, and networking devices as well. If security pros tear their hair out now trying to safeguard users' computers, I predict we'll all be completely bald trying to manage the new super cell phones that everyone is going to have in a short time.

How shall I own your phone today?

There are just so many interesting attack vectors for cell phones. To start with, there's the obvious threat of physical theft. It's one thing for a thief to heft a desktop box out of your office building, and it's easier to grab a laptop, but even my Mom can sneak a cell phone out past your guards (and she'll be out of jail in just a few months, thank goodness... just kidding, Mom!).

As I've discussed before, you can set phones up so that they appear to be off, leave the phone behind - say, in a conference room - and then call the phone and imperceptibly turn on the speakerphone, allowing you to hear everything said while you're out of the room. Even criminals know about phones that go into "ghost" mode. Yes, there are solutions, but how many of you have them as a line item in your budget?

And then we have Bluetooth. I'm not going to begin declaring that the sky is falling, and that Bluetooth on cell phones means that we're all doomed. However, it would be imprudent not to evince some concern and fail to admit the obvious: Bluetooth can be a security hazard on some phones.

Just a few weeks ago, a security group calling themselves Flexilis made the news. One of their members stood next to the red carpet at the Academy Awards with a laptop and an antenna hidden in his backpack, and the results weren't exactly unsurprising: between 50 and 100 of the celebs were vulnerable to bluesnarfing (ignore the erroneous comparison the article makes between Paris Hilton and the Academy Awards - the techniques used in each situation are completely different).

This isn't the first time Bluetooth has been found to be problematic. The previous link contains a good overview of several ways to attack Bluetooth-enabled devices, including bluesnarfing, bluejacking, bluebugging (similar to the "ghost phone" issue I mentioned above), and the backdoor attack. For more info, also see http://www.thebunker.net/security/bluetooth.htm, which provides details and a list of vulnerable phones. And now that Bluetooth rifles effectively extend the range of the technology from about 33 feet to a full mile (!), things can only get more precarious. It would be worth your time to read these web pages and familiarize yourself with Bluetooth and its problems, as well as its advantages.

That's right: advantages. Bluetooth is ultra-cool, that's for sure. Automatically syncing phone contacts with computer contacts is undeniably attractive to the busy info worker on the go, and wireless headsets are also really nice. Bluetooth is just too useful to go away, but it's up to security pros to educate users about the dangers of Bluetooth-enabled cell phones and, in fact, non-Bluetooth phones as well. As cell phones grow even more ubiquitous (is that even possible?) and yet more powerful, people are going to store greater quantities of very valuable information on them, just as they grow potentially more accessible to bad guys. When it comes to cell phones, we're going to need to keep our eyes - and ears - on them constantly ... except when we're driving, of course.

Scott Granneman is a senior consultant for Bryan Consulting Inc. in St. Louis. He specializes in Internet Services and developing Web applications for corporate, educational, and institutional clients.

Copyright © 2004, SecurityFocus logo

Related stories

<Symbian Trojan attacks anti-virus protection
MMS virus discovered
Paris Hilton's Sidekick hacked
Dampig Trojan menaces Symbian mobiles
T-Mobile hacker pleads guilty
Users choke on mobile spam
Mobile virus epidemics: don't panic

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
EE fails to apologise for HUGE T-Mobile outage that hit Brits on Friday
Customer: 'Please change your name to occasionally somewhere'
Time Warner Cable customers SQUEAL as US network goes offline
A rude awakening: North Americans greeted with outage drama
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
BT customers face broadband and landline price hikes
Poor punters won't be affected, telecoms giant claims
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.