2013-10-06

Apple’s new operating system known as iOS7 comes with a clever feature called “AirDrop.” This much-anticipated feature is similar to the NFC (near field communications) technology that can be found on most Android phones. But the difference between AirDrop and Android’s NFC technology is that AirDrop can be used at a greater distance than its competitors.

Also, with Android phones, users must touch the devices together in order to transfer photos, files, and documents, but AirDrop does not require a physical touch between devices to initiate a connection.

AirDrop uses two technologies: a combination of Bluetooth and Wi-Fi Ad-Hoc networks. AirDrop is available to users when they are within a maximum distance of 100 meters, and Wi-Fi is enabled in Ad-Hoc mode. But there’s a problem with both technologies – they can be hacked.

According to Wikipedia, Bluetooth is “a wireless technology standard for exchanging data over short distances (using short-wavelength radio transmissions in the ISM band from 2400–2480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. Created by telecom vendor Ericsson in 1994, it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization.”

According to Wikipedia, a Wireless Ad-Hoc network “is a decentralized type of wireless network. The network is Ad-Hoc because it does not rely on a pre-existing infrastructure, such as, routers in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in routing by forwarding data for other nodes, so the determination of which nodes forward data is made dynamically on the basis of network connectivity. In addition to the classic routing, Ad-Hoc networks can use flooding for forwarding data. An Ad-Hoc network typically refers to any set of networks where all devices have equal status on a network and are free to associate with any other Ad-Hoc network device in link range.”

When an iPhone user activates Bluetooth, discovery cannot be turned off. This means that another user with a Bluetooth transceiver in a smartphone or laptop is discoverable to you – and your iPhone is discovering it. The only way to turn off discovery mode is to turn off Bluetooth completely. With the proper software, the devices with Bluetooth can be compromised.

But most people don’t realize this and, instead, always leave Bluetooth in the “On” position on for the sake of convenience. It’s human nature to choose the easy option and not be bothered to constantly go back into the settings app and make changes. This is one reason that Bluetooth is open to attack because as long as it is in discovery mode, anyone with nefarious intent can find another iPhone user or tablet user. (1)

The second technology used by AirDrop is an Ad-Hoc Wi-Fi network. Since Ad-Hoc uses each node to forward data to other nodes, any of the nodes could be an attack vector to steal data from the Ad-Hoc network. This can also be accomplished with spear phishing attacks and other types of social engineering. (2)

As with any Wi-Fi network, distance can be an issue with attack. If you don’t know who else is attached to your network, you cannot control who may be able to access your data. One of the features AirDrop offers is a “show to all” option so that whenever a newer iPhone, iPad, etc., is brought into a room (by its user), it will announce (in technology-speak) that it is available. This is like announcing, “Dinner is now served in the main dining room.” If everyone knows that an iDevice has entered a room, someone can hack it.

And finally, while a device is locked, AirDrop can be activated. This feature is very dangerous. If the phone is stolen, files can be compromised without the benefit of having to crack the device first. Therefore, this “feature” should be disabled when the device is used for business purposes, unless strict security policies are put in place.

The bottom line is that while AirDrop may sound like a good idea in theory, it needs more security embedded into it for data transfers to be considered. Until then, the NFC technology where both devices must touch in order for data to be transferred is much more secure.

While it is true that with time, money, and effort, anything can be hacked. It’s also true that the more difficult it is, the less likely you will be hacked by amateurs. For SMBs, this means you should be wary of new technology until it has been proven safe and effective for the enterprise. You don’t want your data walking out the door without your knowledge.

__________

Sources for This Post:

(1) Cracking the Bluetooth Personal Identification Number (PIN)

http://www.eng.tau.ac.il/~yash/shaked-wool-mobisys05/

(2) Know the Risks of Ad Hoc Wireless LANs

http://www.airdefense.net/eNewsletters/adhoc.shtm

___________

Allan Pratt, an infosec strategist, represents the alignment of technology, marketing, and management. With an MBA Degree and four CompTIA certs in computers, networks, servers, and security, Allan translates tech issues into everyday language that is easily understandable by all business units. His expertise includes the installation and maintenance of all aspects of the PC and peripheral lifecycle and the planning and integration of end-to-end security solutions. Allan also teaches both the CompTIA A+ and the CompTIA Security+ certification courses, and has been quoted in industry publications. Follow Allan on Twitter (http://www.twitter.com/Tips4Tech)  and on Facebook (http://www.facebook.com/Tips4Tech).

Cross-Posted from Tips4Tech (http://tips4tech.wordpress.com)

Copyright 2010 Respective Author at Infosec Island

Show more