Hackers Can Hijack Millions of Wireless Headphones and Speakers, Leaving Them Open to Eavesdropping and Tracking. A group of researchers from Belgium's KU Leuven University Computer Security and Industrial Cryptography group has discovered that 17 models of headphones and speakers use Google's one-tap Fast Pair Bluetooth protocol in a way that leaves them open to eavesdroppers and stalkers.
The vulnerabilities, collectively known as WhisperPair, allow hackers to silently pair with affected devices even if they're already paired. This can be done by obtaining a unique Model ID value specific to the target device model or by querying a publicly available Google API for every possible Model ID.
Using this technique, an attacker would need only to be within Bluetooth range and then carry out a takeover in under 15 seconds. The hacked devices can then be used to listen to the victim's surroundings, play their own audio through the victim's earbuds or speakers at any volume they choose, or even use Google's Find Hub feature to track the target user's movements.
The problem lies with Google's Fast Pair protocol, which was designed for ultra-convenient connections. While it offers ease of use, it does so at the cost of security. The researchers say that this is a classic case of "convenience doesn't immediately mean less secure".
Device manufacturers were found to have certified their products as passing Google's requirements even though they contained dangerous flaws. This highlights the need for device manufacturers to prioritize security when adding ease-of-use features.
Google has published a security advisory and made updates available to fix these vulnerabilities, but many users may not be aware of or update their devices due to the complexity of the process.
The researchers are urging all users to update their vulnerable accessories, as the patch installations will likely be inconsistent. The website created by the researchers provides a searchable list of affected devices.
The vulnerabilities, collectively known as WhisperPair, allow hackers to silently pair with affected devices even if they're already paired. This can be done by obtaining a unique Model ID value specific to the target device model or by querying a publicly available Google API for every possible Model ID.
Using this technique, an attacker would need only to be within Bluetooth range and then carry out a takeover in under 15 seconds. The hacked devices can then be used to listen to the victim's surroundings, play their own audio through the victim's earbuds or speakers at any volume they choose, or even use Google's Find Hub feature to track the target user's movements.
The problem lies with Google's Fast Pair protocol, which was designed for ultra-convenient connections. While it offers ease of use, it does so at the cost of security. The researchers say that this is a classic case of "convenience doesn't immediately mean less secure".
Device manufacturers were found to have certified their products as passing Google's requirements even though they contained dangerous flaws. This highlights the need for device manufacturers to prioritize security when adding ease-of-use features.
Google has published a security advisory and made updates available to fix these vulnerabilities, but many users may not be aware of or update their devices due to the complexity of the process.
The researchers are urging all users to update their vulnerable accessories, as the patch installations will likely be inconsistent. The website created by the researchers provides a searchable list of affected devices.