{"id":81152,"date":"2022-05-17T15:25:47","date_gmt":"2022-05-17T20:25:47","guid":{"rendered":"https:\/\/milesfortis.com\/?p=81152"},"modified":"2022-05-17T15:45:20","modified_gmt":"2022-05-17T20:45:20","slug":"81152","status":"publish","type":"post","link":"https:\/\/milesfortis.com\/?p=81152","title":{"rendered":""},"content":{"rendered":"<p>Again, this IOT (Internet Of Things) with everything digitally connected through the web turns out to not be all it was cracked up to be.<\/p>\n<hr \/>\n<p><a href=\"https:\/\/www.digitaltrends.com\/mobile\/bluetooth-hack-compromises-teslas-digital-locks-and-more\/\" target=\"_blank\" rel=\"noopener\">Bluetooth hack compromises Teslas, digital locks, and more<\/a><\/p>\n<p>A group of security researchers has found a way to circumvent digital locks and other security systems that rely on the proximity of a\u00a0<a href=\"https:\/\/www.digitaltrends.com\/computing\/what-is-bluetooth\/\">Bluetooth<\/a>\u00a0fob or smartphone for authentication.<\/p>\n<div id=\"dt-toc\" class=\"b-toc b-sticky h-sticky\">\n<div class=\"b-sticky__inner h-sticky-inner\">\n<div class=\"b-toc__label\">CONTENTS<\/div>\n<ul class=\"b-toc__items\">\n<li class=\"b-toc__item is-active\"><a href=\"https:\/\/www.digitaltrends.com\/mobile\/bluetooth-hack-compromises-teslas-digital-locks-and-more\/#dt-heading-how-it-works\">How it works<\/a><\/li>\n<li class=\"b-toc__item\"><a href=\"https:\/\/www.digitaltrends.com\/mobile\/bluetooth-hack-compromises-teslas-digital-locks-and-more\/#dt-heading-how-to-protect-yourself\">How to protect yourself<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div id=\"e7075b6e-51e6-42ca-856b-2f434962be83\" class=\"dtads-slot dtads-slot-hub callout dtads-is-rendered\" data-slot-type=\"hub\" data-aaad=\"true\" data-aa-adunit=\"\/5611\/dt.desktop.hub.technologycomputing_consumerelectronics_smartphones\" data-aa-sizes=\"[[625,250],[300,250],[&quot;fluid&quot;]]\" data-aa-targeting=\"{&quot;loc&quot;:&quot;hub&quot;}\" data-status=\"rendered\" data-aa-device=\"[&quot;desktop&quot;,&quot;tablet&quot;]\" data-aa-lazy-loaded=\"false\" data-aa-additional-non-h-b-sizes=\"[[625,250]]\" data-google-query-id=\"CL_IhZet5_cCFTPhGAIdoTYOrw\">\n<div id=\"google_ads_iframe_\/5611\/dt.desktop.hub.technologycomputing_consumerelectronics_smartphones_0__container__\">Using what\u2019s known as a \u201clink layer relay attack,\u201d security consulting firm NCC Group was able to unlock, start, and drive vehicles and unlock and open certain residential smart locks without the Bluetooth-based key anywhere in the vicinity.<\/div>\n<\/div>\n<figure class=\"alignnone\"><\/figure>\n<p>Sultan Qasim Khan, the principal security consultant and researcher with NCC Group, demonstrated the attack on a\u00a0<a href=\"https:\/\/www.digitaltrends.com\/topic\/tesla-model-3\/\">Tesla Model 3<\/a>, although he notes that the problem isn\u2019t specific to Tesla. Any vehicle that uses Bluetooth Low Energy (BLE) for its keyless entry system would be vulnerable to this attack.<\/p>\n<p>Many smart locks are also vulnerable, Khan adds. His firm specifically called out the\u00a0<a href=\"https:\/\/www.digitaltrends.com\/home\/kwikset-kevo-2nd-gen-smart-lock\/\">Kwikset\/Weiser Kevo<\/a>\u00a0models since these use a touch-to-open feature that relies on passive detection of a Bluetooth fob or smartphone nearby. Since the lock\u2019s owner doesn\u2019t need to interact with the Bluetooth device to confirm they want to unlock the door, a hacker can relay the key\u2019s Bluetooth credentials from a remote location and open someone\u2019s door even if the homeowner is thousands of miles away.<\/p>\n<h2><a id=\"dt-heading-how-it-works\" aria-label=\"How it works\"><\/a>How it works<\/h2>\n<p>This exploit still requires that the attacker have access to the owner\u2019s actual Bluetooth device or key fob. However, what makes it potentially dangerous is that the real Bluetooth key doesn\u2019t need to be anywhere near the vehicle, lock, or other secured devices.<\/p>\n<p>Instead, Bluetooth signals are relayed between the lock and key through a pair of intermediate Bluetooth devices connected using another method \u2014 typically over a regular internet link. The result is that the lock treats the hacker\u2019s nearby Bluetooth device as if it\u2019s the valid key.<\/p>\n<p>As Khan explains, \u201cwe can convince a Bluetooth device that we are near it \u2014 even from hundreds of miles away [\u2026] even when the vendor has taken defensive mitigations like encryption and latency bounding to theoretically protect these communications from attackers at a distance.\u201d<\/p>\n<p>The exploit bypasses the usual relay attack protections as it works at a very low level of the Bluetooth stack, so it doesn\u2019t matter whether the data is encrypted, and it adds almost no latency to the connection. The target lock has no way of knowing that it\u2019s not communicating with the legitimate Bluetooth device.<\/p>\n<p>Since many Bluetooth security keys operate passively, a thief would only need to place one device within a few feet of the owner and the other near the target lock. For example, a pair of thieves could work in tandem to follow a Tesla owner away from their vehicle, relaying the Bluetooth signals back to the car so that it could be stolen once the owner was far enough away.<\/p>\n<p>These attacks could be carried out even across vast distances with enough coordination. A person on vacation in London could have their Bluetooth keys relayed to their door locks at home in Los Angeles, allowing a thief to quickly gain access simply by touching the lock.<\/p>\n<p>This also goes beyond cars and smart locks. Researchers note that it could be used to unlock laptops that rely on Bluetooth proximity detection, prevent mobile phones from locking, circumvent building access control systems, and even spoof the location of an asset or a medical patient.<\/p>\n<p>NCC Group also adds this isn\u2019t a traditional bug that can be fixed with a simple software patch. It\u2019s not even a flaw in the Bluetooth specification. Instead, it\u2019s a matter of using the wrong tool for the job. Bluetooth was never designed for proximity authentication \u2014 at least not \u201cfor use in critical systems such as locking mechanisms,\u201d the firm notes.<\/p>\n<h2><a id=\"dt-heading-how-to-protect-yourself\" aria-label=\"How to protect yourself\"><\/a>How to protect yourself<\/h2>\n<p>First, it\u2019s essential to keep in mind that this vulnerability is specific to systems that rely exclusively on passive detection of a Bluetooth device.<\/p>\n<p>For example, this exploit can\u2019t realistically be used to bypass security systems that require you to unlock your smartphone, open a specific app, or take some other action, such as pushing a button on a key fob. In this case, there\u2019s no Bluetooth signal to relay until you take that action \u2014 and you\u2019re generally not going to try and unlock your car, door, or laptop when you\u2019re not anywhere near it.<\/p>\n<p>This also won\u2019t typically be a problem for apps that take steps to confirm your location. For instance, the auto-unlock feature in the popular\u00a0<a href=\"https:\/\/www.digitaltrends.com\/home\/august-wi-fi-smart-lock-review\/\">August smart lock<\/a>\u00a0relies on Bluetooth proximity detection, but the app also checks your GPS location to make sure you\u2019re actually returning home. It can\u2019t be used to unlock your door when you\u2019re already home, nor can it open your door when you\u2019re miles away from home.<\/p>\n<p>If your security system allows for it, you should enable an extra authentication step that requires that you take some action before the Bluetooth credentials are sent to your lock. For example, Kwikset has said that customers who use an iPhone can enable two-factor authentication in their lock app, and it plans to add this to its Android app soon.\u00a0<a href=\"https:\/\/www.digitaltrends.com\/home\/kwikset-kevo-2nd-gen-smart-lock\/\">Kwikset\u2019s Kevo application<\/a>\u00a0also disables proximity unlocking functionality when the user\u2019s phone has been stationary for an extended period.<\/p>\n<p>Note that unlocking solutions that use a mix of Bluetooth and other protocols are not vulnerable to this attack. A typical example of this is Apple\u2019s feature that lets folks\u00a0<a href=\"https:\/\/www.digitaltrends.com\/mobile\/how-to-unlock-mac-with-apple-watch\/\">unlock their Mac with their Apple Watch<\/a>. Although this does use Bluetooth to detect the Apple Watch nearby initially, it measures the actual proximity over Wi-Fi \u2014 mitigation that\u00a0<a href=\"https:\/\/vimeo.com\/171186055#t=41m15s\">Apple\u2019s executives specifically said was added to prevent Bluetooth relay attacks<\/a>.<\/p>\n<p>NCC Group has published a technical advisory about\u00a0<a href=\"https:\/\/research.nccgroup.com\/2022\/05\/15\/technical-advisory-ble-proximity-authentication-vulnerable-to-relay-attacks\/\">Bluetooth Low Energy vulnerability<\/a>\u00a0and separate bulletins about how it affects\u00a0<a href=\"https:\/\/research.nccgroup.com\/2022\/05\/15\/technical-advisory-tesla-ble-phone-as-a-key-passive-entry-vulnerable-to-relay-attacks\/\">Tesla vehicles<\/a>\u00a0and\u00a0<a href=\"https:\/\/research.nccgroup.com\/2022\/05\/15\/technical-advisory-kwikset-weiser-ble-proximity-authentication-in-kevo-smart-locks-vulnerable-to-relay-attacks\/\">Kwikset\/Weiser locks<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Again, this IOT (Internet Of Things) with everything digitally connected through the web turns out to not be all it was cracked up to be. Bluetooth hack compromises Teslas, digital locks, and more A group of security researchers has found a way to circumvent digital locks and other security systems that rely on the proximity &hellip; <a href=\"https:\/\/milesfortis.com\/?p=81152\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29,87],"tags":[],"class_list":["post-81152","post","type-post","status-publish","format-standard","hentry","category-safety","category-technology"],"_links":{"self":[{"href":"https:\/\/milesfortis.com\/index.php?rest_route=\/wp\/v2\/posts\/81152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/milesfortis.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/milesfortis.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/milesfortis.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/milesfortis.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=81152"}],"version-history":[{"count":4,"href":"https:\/\/milesfortis.com\/index.php?rest_route=\/wp\/v2\/posts\/81152\/revisions"}],"predecessor-version":[{"id":81156,"href":"https:\/\/milesfortis.com\/index.php?rest_route=\/wp\/v2\/posts\/81152\/revisions\/81156"}],"wp:attachment":[{"href":"https:\/\/milesfortis.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=81152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/milesfortis.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=81152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/milesfortis.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=81152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}