Bluebugging

Nov. 28, 2022

Cybersecurity experts recently noted that apps that let users connect smartphones or laptops to wireless earplugs can record conversations, and are vulnerable to hacks.

About:

  • It is a form of hacking that lets attackers access a device through its discoverable Bluetooth connection.
  • Once a device or phone is bluebugged, a hacker can listen to the calls, read and send messages and steal and modify contacts.
  • It started out as a threat for laptops with Bluetooth capability.
  • Later hackers used the technique to target mobile phones and other devices.

Process:

  • Bluebugging attacks work by exploiting Bluetooth-enabled devices.
  • The device’s Bluetooth must be in discoverable mode, which is the default setting on most devices.
  • The hacker then tries to pair with the device via Bluetooth.
  • Once a connection is established, hackers can use brute force attacks to bypass authentication.
  • They can install malware in the compromised device to gain unauthorised access to it.
  • Bluebugging can happen whenever a Bluetooth enabled device is within a 10-metre radius of the hacker.
  • However, according to a blog by VPN service provider NordVPN, hackers can use booster antennas to widen the attack range.

Which devices are most susceptible to such attacks?

  • Any Bluetooth-enabled device can be bluebugged.
  • Wireless earbuds are susceptible to such hacks.
  • Apps that enable users to connect to their TWS (True Wireless Stereo) devices or earbuds can record conversations.
  • The apps of these TWS devices can record conversations.
  • Once hacked, the attacker can make and listen to calls, read and send messages, and modify or steal your contacts.
Source : The Hindu