Google's Fast Pair Bluetooth protocol, designed to streamline device connections, has been found to be vulnerable to hacking and tracking by security researchers at Belgium's KU Leuven University. The protocol's flaws were exploited to create an "invisible man" that can hijack hundreds of millions of earbuds, headphones, and speakers.
The vulnerabilities were discovered in 17 audio accessories from 10 different companies, including Sony, Jabra, JBL, Marshall, Xiaomi, Nothing, OnePlus, Soundcore, Logitech, and Google. The hacking techniques, called "WhisperPair," allow anyone within Bluetooth range of these devices to pair with them and take control of their audio streams or phone conversations.
Researchers Sayon Duttagupta and Nikola AntonijeviΔ demonstrated the vulnerabilities in a video and found that they could hijack devices in under 15 seconds. They also discovered that some devices linked to Google accounts could be used to track users' locations using Google's Find Hub feature.
To exploit these vulnerabilities, hackers would need to obtain a Model ID value specific to the target device model. These IDs can be obtained by owning or purchasing a device of the same model as the target's or querying a publicly available Google API.
Google has acknowledged the findings and published a security advisory, working with researchers to fix the problem. However, many users may not update their devices' software due to the complexity of the process.
Device manufacturers have made updates available for affected devices, but installations are likely to be inconsistent. The researchers urge all users to update their vulnerable accessories and use this as an opportunity to remind themselves to update other internet-of-things devices.
The study highlights the need for device manufacturers to prioritize security when adding ease-of-use features. Convenience does not immediately mean less secure, and neglecting security in pursuit of convenience can have serious consequences.
The vulnerabilities were discovered in 17 audio accessories from 10 different companies, including Sony, Jabra, JBL, Marshall, Xiaomi, Nothing, OnePlus, Soundcore, Logitech, and Google. The hacking techniques, called "WhisperPair," allow anyone within Bluetooth range of these devices to pair with them and take control of their audio streams or phone conversations.
Researchers Sayon Duttagupta and Nikola AntonijeviΔ demonstrated the vulnerabilities in a video and found that they could hijack devices in under 15 seconds. They also discovered that some devices linked to Google accounts could be used to track users' locations using Google's Find Hub feature.
To exploit these vulnerabilities, hackers would need to obtain a Model ID value specific to the target device model. These IDs can be obtained by owning or purchasing a device of the same model as the target's or querying a publicly available Google API.
Google has acknowledged the findings and published a security advisory, working with researchers to fix the problem. However, many users may not update their devices' software due to the complexity of the process.
Device manufacturers have made updates available for affected devices, but installations are likely to be inconsistent. The researchers urge all users to update their vulnerable accessories and use this as an opportunity to remind themselves to update other internet-of-things devices.
The study highlights the need for device manufacturers to prioritize security when adding ease-of-use features. Convenience does not immediately mean less secure, and neglecting security in pursuit of convenience can have serious consequences.