Summary: A new class of attack named “WhisperPair” targets the Google Fast Pair implementation in millions of Bluetooth audio accessories. Attackers can force a “ghost pairing” from up to 100 meters away, allowing them to record audio, inject fake voice commands, or eavesdrop on private calls without any user notification.
Business Impact: Significant for corporate confidentiality. Executives using wireless headsets in public spaces or airports are at high risk of “acoustic eavesdropping.” This provides a new vector for industrial espionage that bypasses the smartphone’s primary security layers.
Why It Happened: The flaw exists in the unauthenticated pairing phase of the Google Fast Pair protocol, where the device trusts a “Pairing Request” that mimics a previously known accessory.
Recommended Executive Action: Instruct all staff to disable “Google Fast Pair” in their device settings. For sensitive executive meetings, mandate the use of wired headsets or hardware-encrypted wireless audio solutions.
Hashtags: #WhisperPair #BluetoothSecurity #GoogleFastPair #Eavesdropping #Privacy #MobileSecurity
