Car burglars latest to seize on Bluetooth vulnerabilities


Save Story

Estimated read time: 3-4 minutes

This archived news story is available only for your personal, non-commercial use. Information in the story may be outdated or superseded by additional information. Reading or replaying the story in its archived form does not constitute a republication of the story.

PROVO — Even at elevation, nobody expects a threat to appear out of thin air.

Police acknowledge, though, that any given parking lot in Provo, elevation 4,549 feet, could eventually fall victim to one of the latest crime trends surfacing across the country.

Some car burglars are believed to have adopted the Bluetooth technology on their own phones to help identify potential target-rich environments for other mobile devices and electronics.

ā€œThey could, say, walk through this parking lot and see on their phone if there are other devices that want to connect to it,ā€ explained Det. Nicolas Itin, who specializes in fraud, credit card theft and skimming, and identity theft cases. ā€œIf we have Bluetooth enabled, (our devices) could be out there transmitting to other devices, saying, ā€˜here I am.ā€™ā€

Itin said there has been no direct evidence yet of a local burglar using a Bluetooth application to target cars and a crime-of-opportunity like a smash-and-grab was still far more likely, but he noted the possible vulnerability.

ā€œIt’s something to consider—Bluetooth and WiFi-enabled devices that are transmitting, letting potential criminals know that they’re there and susceptible to being stolen,ā€ Itin said. ā€œWe see a lot of computers and tablets stolen out of cars. Whether or not that’s from somebody who is thinking far ahead enough to look for Bluetooth devices showing up or if someone’s just looking for what’s in plain view, the bottom line is we’re seeing those items stolen.ā€

Other Bluetooth vulnerabilities

Car burglars wouldn’t be the first group to utilize Bluetooth to mine for something valuable.

Eide Bailly LLP digital forensics manager Trent Leavitt said Bluetooth was designed to be convenient — not secure.

ā€œThere are numerous vulnerabilities with Bluetooth,ā€ Leavitt said. ā€œThe most popular one, I think, is called BlueBorne.ā€

Security firm Armis was believed to be first in 2017 to report of the dangers of the malware, which literally spreads like a sickness in nearby Bluetooth-enabled devices, all reportedly while undetected.

Eide Bailly LLP digital forensics manager Trent Leavitt said Bluetooth was designed to be convenient—not secure Wednesday, Jan. 29, 2020. Photo: Stuart Johnson, KSL TV
Eide Bailly LLP digital forensics manager Trent Leavitt said Bluetooth was designed to be convenient—not secure Wednesday, Jan. 29, 2020. Photo: Stuart Johnson, KSL TV

ā€œIt can set up backdoors and can start transmitting information to go back-and-forth,ā€ Leavitt said. ā€œYou can actually use that phone from a command-and-control standpoint.ā€

Leavitt said other criminals can mine mobile devices from long distance via a Bluetooth ā€œsniper rifle.ā€

ā€œInstead of shooting a projectile, it shoots a signal, and it can connect to Bluetooth devices, so you can listen to phone calls, you can intercept text messages, listen to what music they’re listening to on the Bluetooth device, potentially even access things they’re doing on their TVs or computers if that is enabled.ā€


It's not if you're going to get hacked - it's when.

–Trent Leavitt, Eide Bailly LLP


Using that device—which has been on the market for well over a decade—a would-be hacker could target smartphones from as far as 250 yards away, according to Leavitt.

ā€œIt’s not new in the security world, but most people probably don’t even know that technology exists,ā€ Leavitt said.

What to do about Bluetooth vulnerabilities

While police and security analysts alike maintain that the public is much more at risk to garden variety crimes like smash-and-grab burglaries, they said people should still be aware of the potential risks associated with technology and the ever-changing threat environment.

ā€œIt’s not if you’re going to get hacked — it is when,ā€ Leavitt said. ā€œYour data will be compromised at some point — whether it’s your fault or a company’s fault or someone’s fault. Sometimes it’s no one’s fault at all. There’s always exploits and vulnerabilities because technology is always changing.ā€

Leavitt advised all people to turn off their Bluetooth when they are not using it, something Itin also said was worth considering.

ā€œIf you are committed to leaving your valuables in your car, it’s definitely a prudent step to make sure it’s not transmitting,ā€ Itin said. ā€œIt could potentially represent a security threat.ā€

Most recent Utah stories

Related topics

Andrew Adams, KSLAndrew Adams
Andrew Adams is an award-winning journalist and reporter for KSL. For two decades, he's covered a variety of stories for KSL, including major crime, politics and sports.

STAY IN THE KNOW

Get informative articles and interesting stories delivered to your inbox weekly. Subscribe to the KSL.com Trending 5.
By subscribing, you acknowledge and agree to KSL.com's Terms of Use and Privacy Policy.
Newsletter Signup

KSL Weather Forecast

KSL Weather Forecast
Play button