Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Security

Photos: Drive-by hacks from a suitcase

By Bill Detwiler August 3, 2006, 10:27 AM PDT on Twitter billdetwiler

Image
1
of 5

Researchers with suitcase
Researchers with suitcase
Photos: Drive-by hacks from a suitcase

Joris Evers/CNET News.com

Joris Evers/CNET News.com
Photos: Drive-by hacks from a suitcase

Packed inside the suitcase is hardware including a Via Mini-ITX motherboard, an Apple Computer iPod hard-disk drive, some memory and nine Bluetooth dongles. rnrn

rnPower is supplied by a PicoPSU power supply that can keep the electronics in the bag running for up to 10 hours. The system is essentially a small computer that runs Gentoo Linux and some custom software. rn

rnThe total cost of the BlueBag is about $750, the researchers say.

Photos: Drive-by hacks from a suitcase

The system inside the suitcase can retrieve data from discoverable Bluetooth devices such as cell phones, laptops, handheld computers and GPS navigation gear. rnrn

rnDetails collected by the BlueBag include the type of devices, and which services are available on them. Additionally, the BlueBag could be used to send information to gadgets within range.

Photos: Drive-by hacks from a suitcase

The BlueBag uses off-the-shelf Bluetooth dongles, nine in total. One has been modified and connected to an omnidirectional Netgear antenna to give it extra range and improve scanning. rnrn

rnrnThe Italian researchers have tested the bag in public places in Italy and found many discoverable Bluetooth devices in malls, at an airport and in offices. Most of the devices were phones. rn

rnrn”This complex attack scenario can help to understand that the risk of a Bluetooth worm is definitely real,” Carettoni said. “It is not difficult to exploit existing knowledge to perform this kind of attack, with just 600 euros (about $750) a person can build a BlueBag and do quite massive Bluetooth scanning.”rn

rnBluetooth attacks are considered a threat of the future. While some pests have surfaced that attack Bluetooth-enabled cell phones, none have spread widely. Analysts at Gartner believe a widespread attack could surface by the end of next year.

Photos: Drive-by hacks from a suitcase

The BlueBag can be controlled remotely using a Palm-based handheld device, for example. Of course, the remote uses Bluetooth wireless connectivity.

  • Security
  • Account Information

    Share with Your Friends

    Photos: Drive-by hacks from a suitcase

    Your email has been sent

Share: Photos: Drive-by hacks from a suitcase
Image of Bill Detwiler
By Bill Detwiler
Bill Detwiler is the Editor for Technical Content and Ecosystem at Celonis. He is the former Editor in Chief of TechRepublic and previous host of TechRepublic's Dynamic Developer podcast and Cracking Open, CNET and TechRepublic's popular online show.
  • Account Information

    Contact Bill Detwiler

    Your message has been sent

  • |
  • See all of Bill's content

TechRepublic Premium

  • TechRepublic Premium

    Office relocation checklist

    PURPOSE New office launches and site relocations run the range from straightforward to overly complex. For intricate, sophisticated new office deployments and larger site moves, TechRepublic Premium’s Office relocation checklist can help plan, monitor and execute such projects. From the checklist: LIST REQUIRED OF EQUIPMENT AND SERVICES Begin by creating a simple list of required ...

    Downloads
    Published:  May 25, 2023, 4:00 PM EDT Modified:  May 26, 2023, 11:17 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Onboarding and offboarding IT staff checklist

    PURPOSE Onboarding and offboarding employees requires careful attention. Otherwise, team members may receive insufficient permissions to perform their jobs or continue to have access long after their employment’s termination. Given the stakes, the problem is even worse when managing IT staff permissions, so it’s imperative that your company adopts a system to ensure consistency. Employees, ...

    Downloads
    Published:  May 24, 2023, 4:00 PM EDT Modified:  May 25, 2023, 9:19 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    10 must-know Firefox tips

    PURPOSE TechRepublic Premium presents 10 tips for the Firefox open-source browser. Even if you only follow some of these, you’ll find your browser experience to be much improved. From the article: 1. USE CAUTION WITH ADD-ONS AND THEMES This is one of the first tips I always offer. I’ve seen web browsers with so many ...

    Downloads
    Published:  May 23, 2023, 4:00 PM EDT Modified:  May 24, 2023, 6:46 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Bring your own device policy

    PURPOSE The purpose of this Bring your own device policy from TechRepublic Premium is to provide requirements for BYOD usage and establish the steps that both users and the IT department should follow to initialize, support and remove devices from company access. These requirements must be followed as documented in order to protect company systems ...

    Downloads
    Published:  May 22, 2023, 4:00 PM EDT Modified:  May 23, 2023, 7:26 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice