Most Android phones can be hacked via Bluetooth right now: What to do
Only Android 10 users are safe
Hey, Android users: You might not want to use Bluetooth in public for a while, because there's a serious flaw that could let anyone within Bluetooth range -- say, in a subway car, on a busy street or in a parking lot -- wirelessly hack your device without your knowledge.
"No user interaction is required," states a security advisory posted yesterday (Feb. 6) by the flaw's finder, Jan Ruge of the Technische Universität Darmstadt in Germany. "This vulnerability can lead to theft of personal data and could potentially be used to spread malware (Short-Distance Worm)."
There are two exceptions. Android 10, the most recent version, is largely unaffected by this flaw. An attack will simply crash Bluetooth. So if your phone runs Android 10, you should be okay.
And owners of Google Pixel and Android One phones running Android 9 Pie or Android 8/8.1 Oreo can install the patch that came with the February Android security updates earlier this week. (Pixel and Android One phones running Android 10 should as well.)
But everyone else running Android 8 or 9, the most widely used versions of Android, has to wait for their phone's manufacturer to test and release the February security update.
If your phone can't be updated to Android 8, 9 or 10, then it's probably never going to get the patch. And because we don't yet know the details of how this attack works, it's not clear if even the best Android antivirus apps will help protect you.
How to prevent your phone from getting hacked
In that case, Ruge has some advice.
Sign up to get the BEST of Tom's Guide direct to your inbox.
Here at Tom’s Guide our expert editors are committed to bringing you the best news, reviews and guides to help you stay informed and ahead of the curve!
One, he wrote, "only enable Bluetooth if strictly necessary. Keep in mind that most Bluetooth-enabled headphones also support wired analog audio."
Second, "keep your device non-discoverable. Most are only discoverable if you enter the Bluetooth scanning menu. Nevertheless, some older phones might be discoverable permanently."
The attacker has to know your device's Bluetooth MAC address, or network-interface identifier. Bluetooth devices generally broadcast the MAC address only when they want to be found by other devices, and you can turn that off.
Go into your Android devices's settings, find the wireless or Bluetooth settings, and disable "Discoverable" if you can. You'll still be able to link to Bluetooth devices you've already paired with, but not to new Bluetooth devices.
Before everyone panics, this flaw has not been exploited in the wild, and its discoverers are keeping the details under wraps for the time being so that no bad guys can start using it right away.
But you can bet the baddies are already at work reverse-engineering this month's Android patch to try to find what got fixed and how to exploit it.
Paul Wagenseil is a senior editor at Tom's Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-haul driver, code monkey and video editor. He's been rooting around in the information-security space for more than 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom's Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown up in random TV news spots and even moderated a panel discussion at the CEDIA home-technology conference. You can follow his rants on Twitter at @snd_wagenseil.