About:
- It is a form of hacking that lets attackers access a device through its discoverable Bluetooth connection.
- Once a device or phone is bluebugged, a hacker can listen to the calls, read and send messages and steal and modify contacts.
- It started out as a threat for laptops with Bluetooth capability.
- Later hackers used the technique to target mobile phones and other devices.
Process:
- Bluebugging attacks work by exploiting Bluetooth-enabled devices.
- The device’s Bluetooth must be in discoverable mode, which is the default setting on most devices.
- The hacker then tries to pair with the device via Bluetooth.
- Once a connection is established, hackers can use brute force attacks to bypass authentication.
- They can install malware in the compromised device to gain unauthorised access to it.
- Bluebugging can happen whenever a Bluetooth enabled device is within a 10-metre radius of the hacker.
- However, according to a blog by VPN service provider NordVPN, hackers can use booster antennas to widen the attack range.
Which devices are most susceptible to such attacks?
- Any Bluetooth-enabled device can be bluebugged.
- Wireless earbuds are susceptible to such hacks.
- Apps that enable users to connect to their TWS (True Wireless Stereo) devices or earbuds can record conversations.
- The apps of these TWS devices can record conversations.
- Once hacked, the attacker can make and listen to calls, read and send messages, and modify or steal your contacts.