Skip to main content

Syncing an infected Fitbit could be a security risk, says analyst, but Fitbit’s not worried

fitbit saves life
Image used with permission by copyright holder
A researcher for security company Fortinet has revealed the Fitbit fitness tracker may be used as a vessel to infect your computer with malware, due to vulnerabilities in the way it uses Bluetooth. However, before wearers get too paranoid, the demonstration is only proof that it could happen, rather than something that is happening, and Fitbit has said it hasn’t seen any conclusive data that its wearable could be used this way.

Updated on 10-23-2015 by Andy Boxall: Added in a statement from Fitbit, highlighting the hack was a “theoretical scenario.”

Fitbit issues statement on hack

Following the publication of the story, Fitbit got in touch with Digital Trends and provided the following statement. Here’s the official line on the situation:

“On Wednesday October 21, 2015, reports began circulating in the media based on claims from security vendor, Fortinet, that Fitbit devices could be used to distribute malware. These reports are false. In fact, the Fortinet researcher, Axelle Apvrille who originally made these claims has confirmed to Fitbit that this was only a theoretical scenario and is not possible. Fitbit trackers cannot be used to infect user’s devices with malware. We want to reassure our users that it remains safe to use their Fitbit devices and no action is required.

As background, Fortinet first contacted us in March to report a low-severity issue unrelated to malicious software. Since that time we’ve maintained an open channel of communication with Fortinet. We have not seen any data to indicate that it is possible to use a tracker to distribute malware.

We have a history of working closely with the security research community and always welcome their thoughts and feedback. The trust of our customers is paramount. We carefully design security measures for new products, monitor for new threats, and rapidly respond to identified issues.”

Proof of concept hack demonstrated

What prompted Fitbit to start reassuring its customers? It began when Fortinet analyst, Axelle Apvrille, showed evidence that a hacker within a few meters of a Fitbit device could exploit open Bluetooth ports to place an infected packet on to it, which would transfer to a computer upon syncing later.

It was suggested this could be used to install a trojan or backdoor, and lead to serious problems. The file hidden in the Fitbit would remain even if the device was restarted, and could be sent to it in just 10-seconds, so it could happen when you’re passing someone in the street. There’s a video of the exploit in action here, if you’re interested in the technical side.

However, while the exploit sounds concerning, it’s not something that’s in the hands of criminals, and still requires executing on the host device — something that can’t be done automatically. Apvrille also said she alerted Fitbit to the problem back in March, but says the vulnerabilities are still there today, because the company considers it a low-level bug that will be fixed in the future.

Editors' Recommendations

Andy Boxall
Senior Mobile Writer
Andy is a Senior Writer at Digital Trends, where he concentrates on mobile technology, a subject he has written about for…
After latest hack, experts say smart home security systems stink at securing data
Wyze Cam Pan Review

Another day, another smart home camera system security hack, this one affecting the Seattle-based company Wyze. First reported by the Texas-based cybersecurity firm Twelve Security and confirmed by Wyze, the hack is estimated to have affected 2.4 million customers who had their email addresses, the emails of anyone they ever shared camera access with, a list of their cameras, the last time they were on, and much more information exposed. Some customers even had their health data leaked.

“Personally, in my 10 years of [system administration] and cloud engineering, I never encountered a breach of this magnitude,” wrote Dan Ehrlich, founder  Twelve Security, in a post about the Wyze hack.

Read more
Visa says magstripe credit cards are at risk of data theft if used at gas pumps
visa says old magstripe cards at risk of data theft gas pumps credit card station

If you use an old magnetic stripe (magstripe) credit card, you may want to avoid doing so the next time you’re at a gas pump.

A recent report from Visa suggests that magstripe credit cards may be especially vulnerable to data theft by hackers when used at gas station pumps. The report, published in December 2019, asserts that a form of malware known as a “RAM scraper” had been “injected into the POS [point of sale] environment and was used to harvest payment card data.”

Read more
The next Fitbit could offer Alexa integration and an OLED display
fitbit versa lite review mem2

Fitbit may have been one of the first companies to adopt the smartwatch when the concept was still in its infancy, but ever since the rise of devices like the Apple Watch, the company has largely failed to keep up. That, however, could change if a new leak is to be believed — the next Fitbit could offer an OLED display and Alexa built right into it.

The unknown device is in the class of the current Fitbit Versa, but it’s seemingly a whole lot more functional. Alexa integration is especially notable — as it would allow users to control their smart home and search the web straight from their wrist, like Apple Watch users can do with Siri. The leak itself comes from well-known Twitter leaker Evan Blass.

Read more