Related Topics

CYBER SECURITY
2023 NOV   9
Digital Cookies
2023 OCT   3
Cyber-security
2023 JUN   21
Section 69(A) of IT Act
2023 FEB   10
Crypto-jacking
2022 JUL   28

Blue bugging

2022 NOV 23

Preliminary   > Security   >   Cyber security   >   Cyber crime

Why in news?

  • Several smartphones have their Bluetooth settings on discovery mode as it is a default setting, making it easy for hackers to access the phones when they are within 10 metres from the device. This is done through a process called Bluebugging..

About Blue-bugging:

  • Bluebugging is a form of hacking that lets attackers access a device through its discoverable Bluetooth connection.
  • Once a device or phone is bluebugged, a hacker can listen to the calls, read and send messages and steal and modify contacts.
  • It started out as a threat to laptops with Bluetooth capability. Later hackers used the technique to target mobile phones and other devices.

How does Blue bugging work?

  • Bluebugging attacks by exploiting Bluetooth-enabled devices. The device’s Bluetooth must be in discoverable mode, which is the default setting on most devices.
  • The bluetooth enabled device must also be within a 10-metre radius of the hacker.
  • The hacker then tries to pair with the device via Bluetooth. Once a connection is established, hackers can use brute force attacks to bypass authentication. They can install the malware in the compromised device to gain unauthorized access to it.
  • Any Bluetooth-enabled device can be blue-bugged.
    • Wireless earbuds are also susceptible to such hacks. Apps that enable users to connect to their TWS (True Wireless Stereo) devices or earbuds can record conversations.

PRACTICE QUESTION:

The term ‘Blue bugging’, recently seen in news is associated with:

(a) Marine pollution

(b) Viral infection

(c) Cyber security

(d) Space exploration

Answer