Article Details
Scrape Timestamp (UTC): 2023-10-31 20:12:39.359
Original Article Text
Click to Toggle View
Flipper Zero Bluetooth spam attacks ported to new Android app. Recent Flipper Zero Bluetooth spam attacks have now been ported to an Android app, allowing a much larger number of devices to implement these annoying spam alerts. Inspired by previous research on the topic and Flipper Zero applets targeting iOS devices, and later Android and Windows, software developer Simon Dankelmann developed an Android app capable of the same Bluetooth spam. The Android app, named 'Bluetooth-LE-Spam,' can generate BLE (Bluetooth Low Energy) advertisement packages spoofing various devices to nearby Windows and Android devices, eliminating the need for a Flipper Zero. The project is still in early development, but BleepingComputer's tests confirmed that it works as advertised. Specifically, the app can broadcast connection requests with set time intervals as frequent as 1 second, targeting 'Fast Pair' on Android or 'Swift Pair' on Windows. One thing to note is that even though the Android API allows setting the transmission (TX) power level, developers have limited control over the actual data being broadcasted in relation to the TX power level. This constraint by the Android SDK can result in poor reception from the target devices, which is not a problem in Flipper Zero, which can achieve a more extended and precise range when connecting to other devices. In our tests, we found that some broadcasts were caught by the target only if the Android device generating them was as close as a few centimeters. In contrast, in other cases, notifications were generated from several meters away. An interesting side-effect we noticed is that Bluetooth-connected devices like mice and keyboards can become unresponsive during spam broadcasts. This is another way of creating disruptive "denial of service" attacks on a target. For now, the app stands as a demonstration of a possibility rather than a severe threat to users, but knowing how to turn off these notifications in the event you're targeted is good. On Android, head to Settings → Google → Nearby Share, and turn the toggle on Show notification to the "Off" position. On Windows, open Settings, select 'Bluetooth & devices' from the menu on the left, then click on 'Devices,' scroll down to 'Device settings,' and turn the 'Show notifications to connect using Swift Pair' toggle to the 'Off' position. We recommend against testing the 'Bluetooth-LE-Spam' app on your main device for reasons of security, as BleepingComputer cannot provide any guarantees that the project is safe.
Daily Brief Summary
Software developer Simon Dankelmann has created an Android app that can carry out Bluetooth spam attacks, similar to those previously conducted via the Flipper Zero hardware, a device used for software-defined radio applications.
The 'Bluetooth-LE-Spam' app is able to generate BLE (Bluetooth Low Energy) packages mimicking other devices to send spam alerts to nearby Windows and Android users.
The app is still in the early stages of development, although initial tests confirmed it can broadcast connection requests as frequently as one per second, targeting Android's 'Fast Pair' feature and Windows' 'Swift Pair' feature.
Limitations in Android's software development kit may affect the app’s efficiency compared to Flipper Zero, resulting in poor reception because developers have limited control over the data being broadcast relative to the transmission power level.
The app's broadcasting function can also cause Bluetooth-enabled devices like mice and keyboards to become unresponsive, which could be utilized for "denial of service" attacks.
Currently, the app represents more of a potential for disruption rather than a serious security threat to users. Devices targeted can stop spam notifications by disabling the relevant setting.
BleepingComputer has advised against testing the app on primary devices due to potential safety risks as no official guarantee has been provided that the project is safe.