Google's One-Tap Fast Pair Bluetooth Protocol Leaves Billions of Audio Devices Vulnerable to Hacking and Tracking.
Seventeen models of headphones and speakers that use Google’s one-tap Fast Pair Bluetooth protocol are vulnerable to eavesdroppers and stalkers. The flaws in the protocol, which were discovered by researchers at Belgium's KU Leuven University Computer Security and Industrial Cryptography group, leave devices open to hackers who can pair with audio peripherals and hijack them.
Fast Pair was designed to optimize for ultra-convenient connections, allowing users to connect their Bluetooth gadgets with Android and ChromeOS devices in a single tap. However, the researchers found that this protocol also enables hackers to connect with hundreds of millions of earbuds, headphones, and speakers, potentially tracking an unwitting target's location.
The hacking techniques, collectively called WhisperPair, would allow anyone within Bluetooth range of vulnerable devices—close to 50 feet in testing—to silently pair with audio peripherals and hijack them. A hacker could take over or disrupt audio streams or phone conversations, play their own audio through the victim’s earbuds or speakers at whatever volume they chose, or undetectably take over microphones to listen to the victim's surroundings.
Researchers discovered that 17 vulnerable devices were sold by companies such as Sony, Jabra, JBL, Marshall, Xiaomi, Nothing, OnePlus, Soundcore, Logitech, and Google. In their experiments, using a low-cost Raspberry Pi 4 minicomputer, they tested pairing with 25 different already-paired Fast Pair devices from 16 different vendors and found that the majority of them were vulnerable.
The researchers also discovered that some devices, such as those sold by Google and Sony, could be exploited to allow stealthy, high-resolution stalking using Google's device geolocation tracking feature, Find Hub. If a hacker takes control of a device linked to their own Google account, they can use this feature to track the target user’s movements.
Google offers a Validator App that helps manufacturers test their Fast Pair implementation, but the researchers found that all of the devices tested had been certified by Google despite having dangerous flaws in their implementation. To address these vulnerabilities, Google has published a security advisory and pushed out fixes for its own vulnerable audio accessories as well as an update to Find Hub in Android.
Despite these efforts, the researchers warn that many consumers are unlikely to ever update the software on their internet-of-things devices, which could lead to lingering vulnerabilities persisting for months or years.
Seventeen models of headphones and speakers that use Google’s one-tap Fast Pair Bluetooth protocol are vulnerable to eavesdroppers and stalkers. The flaws in the protocol, which were discovered by researchers at Belgium's KU Leuven University Computer Security and Industrial Cryptography group, leave devices open to hackers who can pair with audio peripherals and hijack them.
Fast Pair was designed to optimize for ultra-convenient connections, allowing users to connect their Bluetooth gadgets with Android and ChromeOS devices in a single tap. However, the researchers found that this protocol also enables hackers to connect with hundreds of millions of earbuds, headphones, and speakers, potentially tracking an unwitting target's location.
The hacking techniques, collectively called WhisperPair, would allow anyone within Bluetooth range of vulnerable devices—close to 50 feet in testing—to silently pair with audio peripherals and hijack them. A hacker could take over or disrupt audio streams or phone conversations, play their own audio through the victim’s earbuds or speakers at whatever volume they chose, or undetectably take over microphones to listen to the victim's surroundings.
Researchers discovered that 17 vulnerable devices were sold by companies such as Sony, Jabra, JBL, Marshall, Xiaomi, Nothing, OnePlus, Soundcore, Logitech, and Google. In their experiments, using a low-cost Raspberry Pi 4 minicomputer, they tested pairing with 25 different already-paired Fast Pair devices from 16 different vendors and found that the majority of them were vulnerable.
The researchers also discovered that some devices, such as those sold by Google and Sony, could be exploited to allow stealthy, high-resolution stalking using Google's device geolocation tracking feature, Find Hub. If a hacker takes control of a device linked to their own Google account, they can use this feature to track the target user’s movements.
Google offers a Validator App that helps manufacturers test their Fast Pair implementation, but the researchers found that all of the devices tested had been certified by Google despite having dangerous flaws in their implementation. To address these vulnerabilities, Google has published a security advisory and pushed out fixes for its own vulnerable audio accessories as well as an update to Find Hub in Android.
Despite these efforts, the researchers warn that many consumers are unlikely to ever update the software on their internet-of-things devices, which could lead to lingering vulnerabilities persisting for months or years.