Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Communications Between Smartwatches and Phones Exposed to Hack Attacks: Researchers

Researchers at Bitdefender have conducted some experiments to find out just how difficult it is for a hacker to intercept the data sent between smartphones and smartwatches.

Researchers at Bitdefender have conducted some experiments to find out just how difficult it is for a hacker to intercept the data sent between smartphones and smartwatches.

Tech companies are rushing to launch smartwatches and smartbands, and many people are eager to try them out. However, few of the vendors focus on making sure the devices are secure.

Smartwatches are capable of displaying notifications for emails, SMS messages, incoming calls, and various third-party apps, such as Google Hangouts and Facebook Messenger. Bitdefender’s experiment shows that many of these communications are exposed to attacks. 

The security firm performed tests on a Google Nexus 4 smartphone running Android L Preview and a Samsung Gear Live smartwatch.

The devices communicate with each other via Bluetooth, which means that an attacker has to be in proximity of his target. However, once this obstacle is overcome, it is relatively easy to intercept Bluetooth communications between the phone and the smartwatch.

Data obfuscated by Android Wear, the Android operating system designed for smartwatches and other wearables, is protected only by a 6-digit PIN which is set during the initial pairing of the devices. Researchers have demonstrated that the 6-digit code can be easily brute-forced with the aid of widely available tools.

“We’re pretty sure that, if someone were to do more in-depth research into how the Wear obfuscation actually works, we would soon end up with some fascinating exploit packs. Weaponizing this is only a matter of how much someone would have to gain from reading your conversation, even in close proximity,” Bitdefender said in its report.

As a solution to this problem, the security company recommends the use of near-field communications (NFC) for transferring data between smartphones and wearables. The problem with this method is that not all phones and wearable devices include the feature.

Advertisement. Scroll to continue reading.

The use of stronger passwords during the pairing process is also an option, but it can be difficult for smartwatch users to type a complex string on the device. Application-level encryption can also mitigate such attacks, but this should be implemented by Google or OEMs, and the downside is that a secondary layer of encryption would have a negative impact on battery life.

Earlier this month, the Bluetooth Special Interest Group officially adopted version 4.2 of the Bluetooth core specification, which is said to be not only faster, but also more secure compared to previous versions.

Bitdefender says it hasn’t had the chance to analyze the new Bluetooth version. However, the company has pointed out in an email that their experiments haven’t targeted over-the-air Bluetooth communications, which are encrypted by the device’s baseband co-processor. Instead, researchers targeted traffic before it was sent to the baseband co-processor.

 Bitdefender has published a short video of its experiment which is embedded below.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.