Published on: November 30, 2022
Blue bugging
Blue bugging
Why in news?
Cyber security experts note that apps that let users connect smartphones or laptops to wireless earplugs can record conversations, and are vulnerable to hacks, even iPhones are not immune from the threats
Highlights
What is Bluebugging?
- It is a form of hacking that lets attackers access a device through its discoverable Bluetooth connection.
- Once a device or phone is bluebugged, a hacker can listen to the calls, read and send messagesand steal and modify contacts.
- It started out as a threat for laptops with Bluetooth capability. Later hackers used the technique to target mobile phones and other devices.
How does bluebugging hack devices?
- They can install malware in the compromised device to gain unauthorised access to it by which Bluetooth is in discoverable mode and tries to pair once connection is established
- Bluebugging can happen whenever a Bluetooth enabled device is within a 10metre radius of the hacker
How can one prevent bluebugging ?
- Turning off Bluetooth and disconnecting paired Bluetooth devices when not in use, updating the device’s system software to the latest version, limited use of public WiFi and using VPN as an additional security measure are some of the ways to prevent bluebugging
- Modern antivirus softwares can also help thwart such attacks.
- The newage antivirus softwares are helping users to detect strange and spam like content by filtering, blocking and consistently reminding people to be alert
Which devices are most susceptible to such attacks?
- Any Bluetoothenabled device can be bluebugged. Wireless earbuds are susceptible to such hacks.
-
Apps that enable users to connect to their TWS (True Wireless Stereo) devices or earbuds can record conversations. The apps of these TWS devices can record conversations