{"id":4319,"date":"2023-11-29T16:27:12","date_gmt":"2023-11-29T16:27:12","guid":{"rendered":"https:\/\/secry.me\/explore\/?p=4319"},"modified":"2023-12-03T18:05:55","modified_gmt":"2023-12-03T18:05:55","slug":"hackers-exploit-new-bluffs-attack-on-bluetooth-connections","status":"publish","type":"post","link":"https:\/\/secry.me\/explore\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\/","title":{"rendered":"Hackers Exploit New BLUFFS Attack on Bluetooth Connections"},"content":{"rendered":"<div class=\"c7f5092f831f91fb6af859cc3a8052cc\" data-index=\"4\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/securepubads.g.doubleclick.net\/tag\/js\/gpt.js\"><\/script>\r\n<script>\r\n  window.googletag = window.googletag || {cmd: []};\r\n  googletag.cmd.push(function() {\r\n    googletag.defineSlot('\/22608490431\/iklan1', [[320, 100], [300, 50]], 'div-gpt-ad-1696178236578-0').addService(googletag.pubads());\r\n    googletag.pubads().enableSingleRequest();\r\n    googletag.enableServices();\r\n  });\r\n<\/script>\r\n<!-- \/22608490431\/iklan1 -->\r\n<div id='div-gpt-ad-1696178236578-0' style='min-width: 300px; min-height: 50px;'>\r\n  <script>\r\n    googletag.cmd.push(function() { googletag.display('div-gpt-ad-1696178236578-0'); });\r\n  <\/script>\r\n<\/div>\n<\/div>\n<p><strong>BLUFFS Attack &#8211; CVE-2023-24023 &#8211;<\/strong> Researchers at Eurecom have uncovered six new exploits collectively named <em>&#8216;BLUFFS&#8217;,<\/em> capable of breaching the confidentiality of Bluetooth sessions. Unlike typical attacks dependent on specific hardware or software configurations, BLUFFS exposes two previously unknown architectural flaws in the Bluetooth standard. These vulnerabilities are tracked under the identifier <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-24023\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2023-24023<\/a>. CVE-2023-24023 affect Bluetooth Core Specification 4.2 through 5.4, raising concerns about the security of billions of devices, including laptops, smartphones, and other common mobile devices.<\/p>\n<p>&nbsp;<\/p>\n<h3>Understanding BLUFFS: Breaking Bluetooth&#8217;s Secrecy<\/h3>\n<p>BLUFFS isn&#8217;t your typical attack, it comprises exploits aimed at compromising the confidentiality of both past and future Bluetooth sessions. The attack relies on four flaws in the session key derivation process, two of which researchers had not discovered before.<\/p>\n<p>By exploiting these flaws, attackers force the derivation of a short and predictable session key (SKC). Subsequently, the attacker employs brute-force techniques to decrypt historical communications and manipulate future interactions.<\/p>\n<figure id=\"attachment_4327\" aria-describedby=\"caption-attachment-4327\" style=\"width: 520px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" td-modal-image wp-image-4327 size-full\" src=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/BLUFFS-Attack-Step.webp\" alt=\"BLUFFS Attack Step. Source: (dl.acm.org)\" width=\"520\" height=\"160\" srcset=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/BLUFFS-Attack-Step.webp 520w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/BLUFFS-Attack-Step-300x92.webp 300w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/BLUFFS-Attack-Step-150x46.webp 150w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" \/><figcaption id=\"caption-attachment-4327\" class=\"wp-caption-text\">BLUFFS Attack Step<\/figcaption><\/figure>\n<p>The crux of BLUFFS lies in the attacker&#8217;s ability to be within Bluetooth range of two communicating devices. The attacker, posing as one of the devices, manipulates the negotiation process for a weak session key.<\/p>\n<figure id=\"attachment_4332\" aria-describedby=\"caption-attachment-4332\" style=\"width: 459px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4332\" src=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Negotiating-a-session-key-while-spoofing.webp\" alt=\"Negotiating a session key while spoofing\" width=\"459\" height=\"507\" srcset=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Negotiating-a-session-key-while-spoofing.webp 459w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Negotiating-a-session-key-while-spoofing-272x300.webp 272w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Negotiating-a-session-key-while-spoofing-150x166.webp 150w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Negotiating-a-session-key-while-spoofing-300x331.webp 300w\" sizes=\"auto, (max-width: 459px) 100vw, 459px\" \/><figcaption id=\"caption-attachment-4332\" class=\"wp-caption-text\">Negotiating a session key while spoofing a legitimate party. Source: dl.acm.org<\/figcaption><\/figure>\n<p>This involves proposing the lowest possible key entropy value and utilizing a constant session key diversifier. The attack is agnostic to whether the victims support Secure Connections (SC) or Legacy Secure Connections (LSC), making it a pervasive threat.<\/p>\n<p>The released <a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3623066\" target=\"_blank\" rel=\"nofollow noopener\">paper<\/a> outlines six BLUFFS attack variations, encompassing different combinations of impersonation and Man-in-the-Middle (MitM) tactics. These strategies remain effective irrespective of the victim&#8217;s support for Secure Connections (SC) or Legacy Secure Connections (LSC).<\/p>\n<p>The researchers developed and shared a <a href=\"http:\/\/github.com\/francozappa\/bluffs\" target=\"_blank\" rel=\"nofollow noopener\">toolkit<\/a> on GitHub that demonstrates the effectiveness of BLUFFS. It includes a Python script to test the attacks, the ARM patches, the parser, and the PCAP samples captured during their tests.<\/p>\n<p>&nbsp;<\/p>\n<h3>Impact and Mitigation Strategies<\/h3>\n<p>BLUFFS impacts Bluetooth versions 4.2 through the latest 5.4, affecting devices dating back to December 2014. The researchers tested BLUFFS against various devices running Bluetooth versions 4.1 through 5.2, confirming susceptibility to at least three out of six BLUFFS attacks. The proposed backward-compatible modifications include introducing a new &#8220;Key Derivation Function&#8221; (KDF) for Legacy Secure Connections (LSC), mutual nonce exchange, and verification, shared pairing keys, enforcing Secure Connections (SC) mode, and maintaining a cache of session key diversifiers to prevent reuse.<\/p>\n<figure id=\"attachment_4329\" aria-describedby=\"caption-attachment-4329\" style=\"width: 916px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" td-modal-image wp-image-4329 size-full\" src=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/List-of-Tested-Device.webp\" alt=\"List of Tested Device\" width=\"916\" height=\"566\" srcset=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/List-of-Tested-Device.webp 916w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/List-of-Tested-Device-300x185.webp 300w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/List-of-Tested-Device-768x475.webp 768w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/List-of-Tested-Device-150x93.webp 150w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/List-of-Tested-Device-696x430.webp 696w\" sizes=\"auto, (max-width: 916px) 100vw, 916px\" \/><figcaption id=\"caption-attachment-4329\" class=\"wp-caption-text\">List of Tested Device. Source: dl.acm.org<\/figcaption><\/figure>\n<p>Bluetooth SIG, the organization overseeing Bluetooth standard development, has acknowledged the report from Eurecom and published a <a href=\"https:\/\/www.bluetooth.com\/learn-about-bluetooth\/key-attributes\/bluetooth-security\/bluffs-vulnerability\/\" target=\"_blank\" rel=\"nofollow noopener\">statement<\/a> on its site. In response, they advocate for rejecting connections with low key strengths, employing &#8216;Security Mode 4 Level 4&#8217; for higher encryption strength, and operating in &#8216;Secure Connections Only&#8217; mode during pairing. These recommendations aim to bolster session key derivation and mitigate not only BLUFFS but also similar threats, underlining the ongoing efforts to fortify Bluetooth security.<\/p>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\"><\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>BLUFFS Attack &#8211; CVE-2023-24023 &#8211; Researchers at Eurecom have uncovered six new exploits collectively named &#8216;BLUFFS&#8217;, capable of breaching the confidentiality of Bluetooth sessions. Unlike typical attacks dependent on specific hardware or software configurations, BLUFFS exposes two previously unknown architectural flaws in the Bluetooth standard. These vulnerabilities are tracked under the identifier CVE-2023-24023. CVE-2023-24023 affect [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4334,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[194,131],"tags":[398,399,291,192,400,325,267],"class_list":["post-4319","post","type-post","status-publish","format-standard","has-post-thumbnail","category-cyber-security","category-news","tag-bluetooth","tag-bluffs","tag-cve","tag-cyber-security","tag-eurecom","tag-exploit","tag-threat"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.4 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hackers Exploit New BLUFFS Attack on Bluetooth Connections | SECRY<\/title>\n<meta name=\"description\" content=\"BLUFFS Attack - CVE-2023-24023 - Researchers at Eurecom have uncovered six new exploits collectively named &#039;BLUFFS&#039;, capable of breaching the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/secry.me\/explore\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Exploit New BLUFFS Attack on Bluetooth Connections | SECRY\" \/>\n<meta property=\"og:description\" content=\"BLUFFS Attack - CVE-2023-24023 - Researchers at Eurecom have uncovered six new exploits collectively named &#039;BLUFFS&#039;, capable of breaching the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/secry.me\/explore\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\/\" \/>\n<meta property=\"og:site_name\" content=\"SECRY\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/secry.me\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-29T16:27:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-03T18:05:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/11\/BLUFFS-Attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Christin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\\\/\"},\"author\":{\"name\":\"Christin\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/bf08de9f590b8968a1d054728257190f\"},\"headline\":\"Hackers Exploit New BLUFFS Attack on Bluetooth Connections\",\"datePublished\":\"2023-11-29T16:27:12+00:00\",\"dateModified\":\"2023-12-03T18:05:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\\\/\"},\"wordCount\":509,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/BLUFFS-Attack.png\",\"keywords\":[\"Bluetooth\",\"BLUFFS\",\"CVE\",\"Cyber Security\",\"Eurecom\",\"Exploit\",\"Threat\"],\"articleSection\":[\"Cyber Security\",\"Hacker News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\\\/\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\\\/\",\"name\":\"Hackers Exploit New BLUFFS Attack on Bluetooth Connections | SECRY\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/BLUFFS-Attack.png\",\"datePublished\":\"2023-11-29T16:27:12+00:00\",\"dateModified\":\"2023-12-03T18:05:55+00:00\",\"description\":\"BLUFFS Attack - CVE-2023-24023 - Researchers at Eurecom have uncovered six new exploits collectively named 'BLUFFS', capable of breaching the\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\\\/#primaryimage\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/BLUFFS-Attack.png\",\"contentUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/BLUFFS-Attack.png\",\"width\":1280,\"height\":720,\"caption\":\"BLUFFS Attack - CVE-2023-24023\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/secry.me\\\/explore\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Exploit New BLUFFS Attack on Bluetooth Connections\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"name\":\"SECRY\",\"description\":\"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections\",\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"alternateName\":\"Security Story\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/secry.me\\\/explore\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\",\"name\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\",\"alternateName\":\"SECRY\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"contentUrl\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"width\":512,\"height\":512,\"caption\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/secry.me\",\"https:\\\/\\\/pinterest.com\\\/secry_me\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/bf08de9f590b8968a1d054728257190f\",\"name\":\"Christin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"caption\":\"Christin\"},\"description\":\"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.\",\"sameAs\":[\"https:\\\/\\\/secry.me\\\/explore\"],\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/author\\\/secry\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hackers Exploit New BLUFFS Attack on Bluetooth Connections | SECRY","description":"BLUFFS Attack - CVE-2023-24023 - Researchers at Eurecom have uncovered six new exploits collectively named 'BLUFFS', capable of breaching the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/secry.me\/explore\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Exploit New BLUFFS Attack on Bluetooth Connections | SECRY","og_description":"BLUFFS Attack - CVE-2023-24023 - Researchers at Eurecom have uncovered six new exploits collectively named 'BLUFFS', capable of breaching the","og_url":"https:\/\/secry.me\/explore\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\/","og_site_name":"SECRY","article_publisher":"https:\/\/www.facebook.com\/secry.me","article_published_time":"2023-11-29T16:27:12+00:00","article_modified_time":"2023-12-03T18:05:55+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/11\/BLUFFS-Attack.png","type":"image\/png"}],"author":"Christin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/secry.me\/explore\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\/#article","isPartOf":{"@id":"https:\/\/secry.me\/explore\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\/"},"author":{"name":"Christin","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/bf08de9f590b8968a1d054728257190f"},"headline":"Hackers Exploit New BLUFFS Attack on Bluetooth Connections","datePublished":"2023-11-29T16:27:12+00:00","dateModified":"2023-12-03T18:05:55+00:00","mainEntityOfPage":{"@id":"https:\/\/secry.me\/explore\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\/"},"wordCount":509,"commentCount":0,"publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"image":{"@id":"https:\/\/secry.me\/explore\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/BLUFFS-Attack.png","keywords":["Bluetooth","BLUFFS","CVE","Cyber Security","Eurecom","Exploit","Threat"],"articleSection":["Cyber Security","Hacker News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/secry.me\/explore\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/secry.me\/explore\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\/","url":"https:\/\/secry.me\/explore\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\/","name":"Hackers Exploit New BLUFFS Attack on Bluetooth Connections | SECRY","isPartOf":{"@id":"https:\/\/secry.me\/explore\/#website"},"primaryImageOfPage":{"@id":"https:\/\/secry.me\/explore\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\/#primaryimage"},"image":{"@id":"https:\/\/secry.me\/explore\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/BLUFFS-Attack.png","datePublished":"2023-11-29T16:27:12+00:00","dateModified":"2023-12-03T18:05:55+00:00","description":"BLUFFS Attack - CVE-2023-24023 - Researchers at Eurecom have uncovered six new exploits collectively named 'BLUFFS', capable of breaching the","breadcrumb":{"@id":"https:\/\/secry.me\/explore\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/secry.me\/explore\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\/#primaryimage","url":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/BLUFFS-Attack.png","contentUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/BLUFFS-Attack.png","width":1280,"height":720,"caption":"BLUFFS Attack - CVE-2023-24023"},{"@type":"BreadcrumbList","@id":"https:\/\/secry.me\/explore\/hackers-exploit-new-bluffs-attack-on-bluetooth-connections\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/secry.me\/explore\/"},{"@type":"ListItem","position":2,"name":"Hackers Exploit New BLUFFS Attack on Bluetooth Connections"}]},{"@type":"WebSite","@id":"https:\/\/secry.me\/explore\/#website","url":"https:\/\/secry.me\/explore\/","name":"SECRY","description":"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections","publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"alternateName":"Security Story","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/secry.me\/explore\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/secry.me\/explore\/#organization","name":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections","alternateName":"SECRY","url":"https:\/\/secry.me\/explore\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/","url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","contentUrl":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","width":512,"height":512,"caption":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections"},"image":{"@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/secry.me","https:\/\/pinterest.com\/secry_me"]},{"@type":"Person","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/bf08de9f590b8968a1d054728257190f","name":"Christin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","caption":"Christin"},"description":"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.","sameAs":["https:\/\/secry.me\/explore"],"url":"https:\/\/secry.me\/explore\/author\/secry\/"}]}},"_links":{"self":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/comments?post=4319"}],"version-history":[{"count":13,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4319\/revisions"}],"predecessor-version":[{"id":4404,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4319\/revisions\/4404"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media\/4334"}],"wp:attachment":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media?parent=4319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/categories?post=4319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/tags?post=4319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}