Security News > 2020 > August > Impersonating users of 'protest' app Bridgefy was as simple as sniffing Bluetooth handshakes for identifiers

Impersonating users of 'protest' app Bridgefy was as simple as sniffing Bluetooth handshakes for identifiers
2020-08-25 16:27

As first reported by Ars Technica, Bridgefy was promoting itself earlier this year as the app of choice for protesters in Hong Kong and India to organise their activities without being easily spied upon by law enforcement agencies.

The app uses both the internet and Bluetooth Low Energy for passing messages between users, falling back to the latter as a mesh network if wider internet connectivity is unavailable.

Impersonating a Bridgefy user is as simple as sniffing a BLE handshake to gather the user ID and device address before spoofing the latter.

On the latter, they noted "Compressing a message of size 10MB containing a repeated single character results in a payload of size 10KB", which was enough to crash Bridgefy to the point where the only way to get it working again was to delete the app and reinstall it from scratch.

The Register has contacted Bridgefy for further comment.


News URL

https://go.theregister.com/feed/www.theregister.com/2020/08/25/bridgefy_royal_holloway_security_analysis/

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Bluetooth 4 0 9 7 0 16