Dark Mode

Settings

Capec-667 Detail

Bluetooth Impersonation AttackS (BIAS)

Detailed Social Engineering Likelihood: Medium Typical Severity: High

Parents: 616

Description

An adversary disguises the MAC address of their Bluetooth enabled device to one for which there exists an active and trusted connection and authenticates successfully. The adversary can then perform malicious actions on the target Bluetooth device depending on the target’s capabilities.

Not present

External ID Source Link Description
CAPEC-667 capec https://capec.mitre.org/data/definitions/667.html
CWE-290 cwe http://cwe.mitre.org/data/definitions/290.html
Explore
  1. Find disguise and target: The adversary starts the Bluetooth service on the attacking device and searches for nearby listening devices.

  2. Techniques
    Knowledge of a trusted MAC address.
    Scanning for devices other than the target that may be trusted.
Experiment
  1. Disguise: Using the MAC address of the device the adversary wants to impersonate, they may use a tool such as spooftooth or macchanger to spoof their Bluetooth address and attempt to authenticate with the target.

Exploit
  1. Use device capabilities to accomplish goal: Finally, if authenticated successfully the adversary can perform tasks/information gathering dependent on the target's capabilities and connections.

  1. Knowledge of a target device's list of trusted connections.

Not present

Low
Adversaries must be in close proximity to Bluetooth devices.
Integrity Confidentiality

Not present