Friday, September 15, 2017

The BlueBorne Identity... Vol 6 rel 10

It seems that not a week goes by in where there is some headline of a major corporation's security has been breached by some malware intrusion, not to mention, the many Entertainment organizations being targeted by these perpetrators.  If it's not someone's private pictures, it's the latest season release of flagship productions being held hostage.  Well if that wasn't bad enough, there is a new type of threat in town - and it doesn't need to be downloaded, clicked, or even connected for that matter...
BlueBorne Unmasked...

It endangers major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux, and the devices using them. It can spread through the air (airborne) and attacks devices via Bluetooth. Armis, the security organization that first discovered the vulnerability, has also disclosed eight related zero-day vulnerabilities, three of which are classified as critical. BlueBorne allows attackers to take control of devices, access corporate data and networks, penetrate secure “air-gapped” networks, and spread malware laterally to adjacent devices. This is just another clear indication that the current standards set by the mainstream security space is inadequate. See BlueBorne Video On how it Operates...


New Dangers...
What makes BlueBorne special is that unlike similar attacks such as the recent one
against Broadcom Wi-Fi chips, which also happened to be airborne, the BlueBorne attack doesn’t affect only the peripherals of a device but can give an attacker full control over the infected device right from the start.
Armis, said that Bluetooth software offers a larger attack surface than Wi-Fi software does, especially since it's been largely ignored by the security community until now.
Armis Labs argued that airborne attacks show a new type of threat that’s typically not taken into account by traditional security solutions. Airborne attacks that can bypass traditional security and even air-gapped internal networks can also endanger industrial systems, government agencies, and critical infrastructure.
The airborne attacks are also easier to spread because the user doesn’t have to download or click anything for the infection to occur. Such attacks are compatible with all software versions of a device, as long as Bluetooth is active.
Devices with Bluetooth enabled are constantly searching for other Bluetooth devices, which can allow an attacker to use the BlueBorne vulnerability to connect to it without having to pair with said device. This makes BlueBorne one of the most broad potential attacks in recent years, while allowing attackers to strike undetected.


Light at the end of the Tunnel...


Now - not just one to present a problem and run away, we do know of a solution. The good news is that it doesn't rely on signatures or behavioral indicators and is over 98% effective at identifying previously Unknown (zero day) malware.
  • Identifies and blocks both known and unknown threats.
  • Easy integration with centralized SIEM solutions.
  • Small footprint client provides real time protection without the use of signatures.
  • Real time detection and prevention of malware through the application of Infinity machine learning models.
  • Memory protection and execution control through kernel modules to address advanced non-resident based threat tactics including Injection/Hijacking techniques, overflows, and in-memory execution techniques
  • Whitelist and blacklist support for administrative granularity
  • Detection mode (passive auditing mode)
  • Self-protection (prevention against user or attacker tampering)
  • Complete control, update and configuration from the management console

Effective defense requires identifying when popular approaches are no longer working and then adapting.

Sign up for one of their upcoming webinars or contact Sales at ContinuityFocus.com 
(800) 399-6085 x502 or email rick.ricker@ContinuityFocus.com


___________________________________________
We would like to thank our sponsors, for without them - our fine content wouldn't be deliverable!


Source(s)

  • https://www.armis.com/blueborne/
  • https://www.tomsguide.com/us/blueborne-bluetooth-security-flaws,news-25836.html

So “Once more unto the breach, dear friends, once more;”

____________________________________________________________

About Rick Ricker



An IT professional with over 23 years experience in Information Security, wireless broadband, network and Infrastructure design, development, and support.


For more information, contact Rick at (800) 399-6085 x502

No comments:

Post a Comment

Thanks for your input, your ideas, critiques, suggestions are always welcome...

- Wasabi Roll Staff