Interviews

Smart wristbands can leak

by Mark Rowe

Fitness trackers have become popular, helping people to stay in shape. However, such devices also process important personal data about their owners and it is important keep it secure, says an IT security product firm.

Kaspersky Lab researcher Roman Unuchek has examined how a number of fitness wristbands interact with a smartphone. He found that the authentication method in several popular smart wristbands allows a third-party to connect invisibly to the device, execute commands, and – in some cases – extract data held on the device. Such data was limited to the amount of steps taken by the owner during the previous hour. However, he adds, when next-generation fitness bands capable of collecting a greater volume of more varied data appear on the market, the risk of sensitive medical data about the owner leaking out could rise.

The connection is made possible because of the way in which the wristband is paired with a smartphone. An Android-based device running Android 4.3 or higher, with a special unauthorised app installed can pair with wristbands from certain vendors. To establish a connection users need to confirm the pairing by pressing a button on their wristband. Attackers can easily overcome this, because most modern fitness wristbands have no screen. When the wristband vibrates asking its owner to confirm the pairing the victim has no way of knowing whether they are confirming a connection with their own device or someone else’s.

“This Proof of Concept depends on a lot of conditions for it to work properly, and in the end an attacker wouldn’t be able to collect really critical data like passwords or credit card numbers. However it proves that there is a way for an attacker to exploit mistakes left unpatched by the device developers. The fitness trackers currently available are still fairly dumb, capable of counting steps and following sleep cycles, but little more than that. But the second generation of such devices is almost here, and they will be able to gather much more information about users. It is important to think about the security of these devices now, and ensure that there is proper protection for how the tracker interacts with the smartphone,” – said Roman Unuchek, Senior Malware Analyst at Kaspersky Lab.

Kaspersky Lab advises users of smart wristbands, concerned about the security of their device, to check with the wristband’s vendors whether such a potential attack vector would be possible on their product.

Related News

  • Interviews

    GDPR is still new

    by Mark Rowe

    GDPR is not over yet, writes Rob Perry, vice president of product marketing at tech firm ASG Technologies. Preparing for GDPR (the…

  • Interviews

    Time to stop apologising

    by Mark Rowe

    Isn’t it time that we stopped apologising for security? asks Jim Swift, pictured, Head of Security, Risk, and Resilience at BB7. We…

  • Interviews

    GDPR in clear English

    by Mark Rowe

    Businesses need to be absolutely clear about terms and definitions if they are to achieve compliance with the new General Data Protection…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing