The Bluetooth protocol, which was never that secure to begin with, now allows the bad guys to track your location on some laptops and phones, but worse could be the entry it offers into the IoT. Credit: Thinkstock/Bluetooth Research published this month by a team from Boston University has revealed a number of flaws in the way that Bluetooth Low Energy functionality is implemented on a wide range of consumer devices.These devices – including both Apple and Microsoft Bluetooth devices – advertise their availability on open channels, and this opens the way for global device tracking. With spyware in the IoT becoming a major source of concern for cybersecurity researchers, this new research indicates that the problem may be even larger than we imagined.The flawThe paper describes a methodology for identifying Bluetooth devices, even when their MAC addresses are hidden or randomized.In early implementations of the Bluetooth protocol, devices ‘advertised’ their presence by broadcasting data on so-called ‘advertising channels’. This system was designed to allow Bluetooth devices to be paired easily but had some significant security vulnerabilities. Specifically, devices sent their Bluetooth MAC address to these channels. This is a permanent address, and so anyone within a few meters of the device was able to collect a unique identifier. This could then be used to track a Bluetooth device wherever it went.In order to combat this problem, the Bluetooth Low Energy standard moved away from using open MAC addresses. Instead, devices using the protocol are given randomized, temporary addresses. These were believed to make newer Bluetooth devices untrackable. The problem now, as the new research points out, is that many of these same devices also use dynamic identifying tokens. These are unique to each device, and they stay static for long enough to be used as a secondary form of identification. This is because these tokens do not change at the same time as randomized MAC addresses, allowing one randomized address to be associated with another via the token.This means that anyone can uniquely identify any devices they are in Bluetooth range of, and potentially track their activity.Which devices are affected?The team behind the research built a system to uniquely identify Bluetooth devices across a test network. The way they did this was remarkably, worryingly simple.Their system is essentially a packet sniffer with a pretty basic algorithm attached. It listens to network traffic over the BLE interface and keeps a log of MAC addresses. It also extracts dynamic identifying tokens for each connected device. Every time it sees a new MAC address, it checks to see if the new address is associated with an existing token.Because tokens and addresses do not change at the same time on many devices, the algorithm can then match the new MAC address to the old MAC address of the same device. This means that activity can be identified as coming from one, unique device.The researchers tested a wide variety of devices, including both Windows and Mac computers, and iPhones. The results varied slightly across these devices, but are still a cause for concern: “The algorithm succeeds consistently on Windows 10 and sometimes on Apple operating systems,” according to the report. “In both cases, the respective identifying tokens change out of sync with the advertising address. In the Windows 10 case, there is no evidence of any synchronization by design. In the Apple case, it seems that there exist mechanisms to synchronize updates of identifying tokens with address randomization, but they occasionally fail.”The broader concern is that, if laptops and smartphones are identifiable in this way, then more basic Bluetooth devices (like those that power the IoT) are also likely to be vulnerable to this kind of exploit.The problem(s) with BluetoothIn the broadest context, Bluetooth is a technology that has never really reached its full potential, not least because there remain significant security holes in the system.This has not slowed down the rise of Bluetooth, though. Adoption of the technology is projected to grow from 4.2 to 5.2 billion devices between 2019 and 2022, with over half a billion amongst them wearables and other data-focused connected devices. While the average BLE range is around 10 to 20 meters (though it has a theoretical range of up to 100 meters), an attacker could extend his reach via a botnet, the researchers said. The ability to identify individual devices might not sound that important for the average Bluetooth user, but it potentially gives attackers (and surveillance agencies) a powerful tool that can be used to launch more sophisticated forms of attack. Back in 2017, for instance, CSO online reported on a Bluetooth worm that used similar techniques to spread.More generally, Bluetooth surveillance is becoming a concern because, as more and more devices use Bluetooth connectivity, identifying Bluetooth signals allows a hacker to pinpoint ALL network traffic passing to and from devices. Achieving this defeats a wide range of security technologies, including the much-hyped secure browsers, and is a common starting point for most of the common types of cyberattack.These problems are unlikely to go away anytime soon, either. The meteoric rise of IoT devices in recent years means that there are millions more devices connected via Bluetooth. In addition, IoT device manufacturers have often prioritized ease of use and connectivity over security concerns. Even worse, many of these IoT devices are now connected to critical hardware, making the consequences of a Bluetooth hack even worse.Avoiding Bluetooth trackingWhen it comes to avoiding the kind of tracking that the paper reported, there is some good news and some bad news. The good news is that Android devices appear to be completely unaffected by this exploit.The bad news is that, if you own another type of device, there is currently no way of using Bluetooth without opening yourself up to this kind of hacking. Hopefully, manufacturers will patch the vulnerability now that the research has been made public, but until then the standard advice applies: Only use Bluetooth when you have to, and make sure that you encrypt all the data passing between your devices and wider networks. Related content opinion How a small business should respond to a hack With small business finding itself in hackers’ crosshairs as much as the big boys, it’s imperative to have an immediate response plan in the event of an attack. By Samuel Bocetta Sep 10, 2019 5 mins Small and Medium Business Ransomware Hacking opinion What are the security implications of Elon Musk's Neuralink? Wacky science fiction has come to life with Elon Musk’s latest idea: chips implanted in human heads that talk to smart devices. What could possibly go wrong? By Samuel Bocetta Aug 01, 2019 6 mins Hacking Privacy Emerging Technology opinion Is AI fundamental to the future of cybersecurity? Thanks to the quickening pace of natural language capability development, artificial intelligence will likely be at the forefront of the next wave of cybersecurity tools.boc By Samuel Bocetta Jun 12, 2019 5 mins Passwords Application Security Data and Information Security opinion Federal cybersecurity agency on the way? As human activity migrates into the online space, keeping the bad guys from mucking it all up becomes paramount. Does that mean it’s time for a federal cybersecurity agency? By Samuel Bocetta May 28, 2019 6 mins Regulation Government Technology Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe