Search
  • Videos
  • 5G
  • Windows 10
  • Cloud
  • Innovation
  • Security
  • Tech Pro
  • more
    • Apple
    • ZDNet Academy
    • Microsoft
    • Mobility
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Log In to ZDNET
    • Join ZDNet
    • About ZDNet
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • 5G
    • Windows 10
    • Cloud
    • Innovation
    • Security
    • Tech Pro
    • Apple
    • ZDNet Academy
    • Microsoft
    • Mobility
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Log In to ZDNET
      • Join ZDNet
      • About ZDNet
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Photos: Drive-by hacks from a suitcase

1 of 5 NEXT PREV
  • Researchers with suitcase

    Researchers with suitcase

    Luca Carettoni (left) and Claudio Merloni are security consultants at Milan, Italy-based Secure Network. The two created the BlueBag to raise awareness about the potential of attacks against Bluetooth-enabled devices, they said in an interview at the Black Hat security event in Las Vegas.

    The BlueBag is a roll-aboard suitcase filled with hardware. That gear is loaded with software to scan for Bluetooth devices and launch attacks against those, the two men said.

    "We started evaluating how Bluetooth technology was spread in a metropolitan area," Carettoni said. "We went around airports, offices and shopping malls and realized that a covered bag can be used quite effectively for malicious purposes."

    Published: August 4, 2006 -- 03:16 GMT (20:16 PDT)

    Caption by: Bill Detwiler

  • open case

    open case

    Packed inside the suitcase is hardware including a Via Mini-ITX motherboard, an Apple Computer iPod hard-disk drive, some memory and nine Bluetooth dongles.

    Power is supplied by a PicoPSU power supply that can keep the electronics in the bag running for up to 10 hours. The system is essentially a small computer that runs Gentoo Linux and some custom software.

    The total cost of the BlueBag is about $750, the researchers say.

    Published: August 4, 2006 -- 03:16 GMT (20:16 PDT)

    Caption by: Bill Detwiler

  • inside the case

    inside the case

    The system inside the suitcase can retrieve data from discoverable Bluetooth devices such as cell phones, laptops, handheld computers and GPS navigation gear.

    Details collected by the BlueBag include the type of devices, and which services are available on them. Additionally, the BlueBag could be used to send information to gadgets within range.

    Published: August 4, 2006 -- 03:16 GMT (20:16 PDT)

    Caption by: Bill Detwiler

  • bluetooth dongle

    bluetooth dongle

    The BlueBag uses off-the-shelf Bluetooth dongles, nine in total. One has been modified and connected to an omnidirectional Netgear antenna to give it extra range and improve scanning.

    The Italian researchers have tested the bag in public places in Italy and found many discoverable Bluetooth devices in malls, at an airport and in offices. Most of the devices were phones.

    "This complex attack scenario can help to understand that the risk of a Bluetooth worm is definitely real," Carettoni said. "It is not difficult to exploit existing knowledge to perform this kind of attack, with just 600 euros (about $750) a person can build a BlueBag and do quite massive Bluetooth scanning."

    Bluetooth attacks are considered . While some pests have surfaced that attack Bluetooth-enabled cell phones, none have spread widely. Analysts at Gartner believe a widespread attack could surface by the end of next year.

    Published: August 4, 2006 -- 03:16 GMT (20:16 PDT)

    Caption by: Bill Detwiler

  • handheld controller

    handheld controller

    The BlueBag can be controlled remotely using a Palm-based handheld device, for example. Of course, the remote uses Bluetooth wireless connectivity.

    Published: August 4, 2006 -- 03:16 GMT (20:16 PDT)

    Caption by: Bill Detwiler

1 of 5 NEXT PREV
  • Researchers with suitcase
  • open case
  • inside the case
  • bluetooth dongle
  • handheld controller

Built for less than $750, this case filled with gear can scan for Bluetooth devices, then launch attacks against them.

Read More Read Less

Researchers with suitcase

Luca Carettoni (left) and Claudio Merloni are security consultants at Milan, Italy-based Secure Network. The two created the BlueBag to raise awareness about the potential of attacks against Bluetooth-enabled devices, they said in an interview at the Black Hat security event in Las Vegas.

The BlueBag is a roll-aboard suitcase filled with hardware. That gear is loaded with software to scan for Bluetooth devices and launch attacks against those, the two men said.

"We started evaluating how Bluetooth technology was spread in a metropolitan area," Carettoni said. "We went around airports, offices and shopping malls and realized that a covered bag can be used quite effectively for malicious purposes."

Published: August 4, 2006 -- 03:16 GMT (20:16 PDT)

Caption by: Bill Detwiler

1 of 5 NEXT PREV

Related Topics:

Networking Security Cloud Internet of Things Data Centers
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • Best Google Chrome extensions (February 2019 edition)

    If you are a Google Chrome user then you can give your productivity and performance a boost by equipping their browser with the right extensions. (Updated February 2019) ...

  • The best VPN services: Our 10 favorite vendors for protecting your privacy

    Whether you're in the office or on the road, a VPN is still one of the best ways to protect yourself on the big, bad internet. One of these could be your best bet. ...

  • Top Google Chrome extensions (2019 edition)

    Google Chrome users can give their productivity and performance a boost by equipping their browser with the right extensions. (Updated January 2019)

  • Best Google Chrome extensions for productivity, security, and performance (2018 edition)

    Here is a selection of Google Chrome extensions aimed specifically at boosting your productivity, performance, and privacy. (Updated December 2018)

  • Great gifts: 5 best TV streaming devices of 2018

    Yes, you can buy a TV with streaming, but internet TV streaming devices are still a great deal. Here are this year's best to consider for your viewing pleasure. ...

  • How AT&T installs Fiber 1000 broadband internet in a home

    If AT&T FTTH comes to your neighborhood, don't hesitate. It's so much better than cable broadband. You'll never look back.

  • This drone can deliver the internet from the edge of space

    The Airbus Zephyr S high-altitude drone could deliver internet access, or carry out surveillance projects.

ZDNet
Connect with us

© 2019 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In | Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums