AirDrop on iPhone allows you to find out the owner number
Apple cares about user security and privacy. This is even confirmed by the advertising slogan:
"What happens on the iPhone, stays on the iPhone" But every system has vulnerabilities and Apple is no exception. Thus, a bug was found in the information sent using Bluetooth A wireless data transfer protocol for interaction between devices. The standard describes a personal area network based on radio waves for the exchange of information at a range of no more than 10 meters. Bluetooth is widely used for communications between mobile gadgets, such as wireless headphones, headsets, keyboards, and mice. Cybercriminals can hack a
Read More
" href="https://10alert.com/glossary/bluetooth/" target="_blank">Bluetooth LE via AirDrop technology.
BLE (Bluetooth with low consumption) contains different information: battery charge, version OS, device location, SHA256 hash of the phone number, etc.
True, only the first 3 bytes are transmitted from the hash, but this turned out to be enough to determine the user number.
An attacker needs to prepare a hash base first. Bluetooth A wireless data transfer protocol for interaction between devices. The standard describes a personal area network based on radio waves for the exchange of information at a range of no more than 10 meters. Bluetooth is widely used for communications between mobile gadgets, such as wireless headphones, headsets, keyboards, and mice. Cybercriminals can hack a
Read More
" href="https://10alert.com/glossary/bluetooth/" target="_blank">Given the low variability of the first 4 digits of the numbers, the task is simplified.
Next, use the AirDrop function. Bluetooth A wireless data transfer protocol for interaction between devices. The standard describes a personal area network based on radio waves for the exchange of information at a range of no more than 10 meters. Bluetooth is widely used for communications between mobile gadgets, such as wireless headphones, headsets, keyboards, and mice. Cybercriminals can hack a
Read More
" href="https://10alert.com/glossary/bluetooth/" target="_blank">After that, it remains to find the corresponding hash in the table and see which number it belongs to.
The standard protection against such searches is to add a salt (an extra line) to the hash. Bluetooth A wireless data transfer protocol for interaction between devices. The standard describes a personal area network based on radio waves for the exchange of information at a range of no more than 10 meters. Bluetooth is widely used for communications between mobile gadgets, such as wireless headphones, headsets, keyboards, and mice. Cybercriminals can hack a
Read More
" href="https://10alert.com/glossary/bluetooth/" target="_blank">But apparently in this case Apple forgot to do it.
This function is easy to operate in crowded places. Bluetooth A wireless data transfer protocol for interaction between devices. The standard describes a personal area network based on radio waves for the exchange of information at a range of no more than 10 meters. Bluetooth is widely used for communications between mobile gadgets, such as wireless headphones, headsets, keyboards, and mice. Cybercriminals can hack a
Read More
" href="https://10alert.com/glossary/bluetooth/" target="_blank">For example, to collect a database of numbers of people at a concert, plane or rally.
Vulnerability found in all iOS since 10.3.1. Bluetooth A wireless data transfer protocol for interaction between devices. The standard describes a personal area network based on radio waves for the exchange of information at a range of no more than 10 meters. Bluetooth is widely used for communications between mobile gadgets, such as wireless headphones, headsets, keyboards, and mice. Cybercriminals can hack a
Read More
" href="https://10alert.com/glossary/bluetooth/" target="_blank">Source files for playback are available in the repository.