What is “bluebugging” that can give hackers access to chats, contacts and more; know how to save yourself

What is “bluebugging” that can give hackers access to chats, contacts and more;  know how to save yourself

What is “bluebugging” that can give hackers access to chats, contacts and more; know how to save yourself

Hackers can gain access to devices with visible Bluetooth connections by “bluebugging”, a form of hacking. After a device or phone has been jailbroken, a hacker can use this technique to eavesdrop on calls, read and transmit messages, and steal or change contacts. It first appeared to be dangerous for laptops or computers with Bluetooth connectivity.

Later, hackers used this technique to attack mobile phones and other gadgets. Independent security researcher Martin Herfurt claims that the bug was able to access the user’s phonebook and call history by exploiting a flaw in the Bluetooth protocol.

Which devices are at risk:

Any gadget that has Bluetooth functionality can be blown. With the use of wireless earbuds, such hacks are possible. Calls can be recorded by users using apps that connect to TWS (True Wireless Stereo) headphones or other devices. After hacking, the attacker has access to your contacts and can change or take them, conduct and record chats, read and send messages and more.

Also read: WhatsApp: Over 2.3 million accounts banned in India in October 2022, here’s why

How Bluebugging works:

Attacks known as “bluebugging” take advantage of Bluetooth-enabled hardware. The device’s Bluetooth must be configured to be discoverable, which is usually the default setting. The hacker then tries to pair with the device via Bluetooth. Once a connection is established, hackers can use brute force attacks to bypass authentication. They can also install malware on the compromised device to gain unauthorized access to it. Once a Bluetooth-enabled device is within 10 meters of the hacker, it can be executed.

See also  Malgré les arrestations, LAPSUS $ Hacking Group frappe à nouveau et frappe le fournisseur informatique

How can Bluebugging be avoided:

Disabling Bluetooth and removing paired Bluetooth devices when not in use are some of the strategies to prevent bluebugging. Updating the system software on the device, limiting the use of open WiFi and using a VPN is also an added layer of security.

Most gadgets have Bluetooth set to visible by default, making your gadgets vulnerable to unauthorized connections. Disabling Bluetooth settings is the first thing you should do to prevent someone from finding your Bluetooth devices. By doing so, they will not become hacker targets and will not be able to connect with the gadget.

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *