BlueBorne is very similar to Stagefright. If an exploit is delivered and triggered on the device the attacker might chain it to root or modify the operating system to compromise the device. In doing so, the local exploit will trigger different threats on zConsole such as system tampering, EOPs and file system changes. Similar to Stagefright, the exploit codes (more specifically, the injected shell codes) for distinct platforms will be different and thus additional overheads need to create new exploit code for a new platform.
Articles in this section
- Does zIPS detect DoubleLocker Ransomware?
- Does zIPS detect KRACKAttack?
- Is the BlueBorne exploit out in the wild?
- What do we do about BlueBorne?
- What is the detection mechanism for a BlueBorne attack or vulnerability?
- Which type of “system behavior” would we observe in zConsole from a BlueBorne attack?
- What is Zimperium Labs?