BLUEBUGGING - SCIENCE AND TECHNOLOGY
News: What
is bluebugging, and how is it used to hack Bluetooth-enabled devices?
What's in the news?
● Cybersecurity
experts note that apps that let users connect smartphones or laptops to
wireless earplugs can record conversations, and are vulnerable to hacks.
● Even
the most secure smartphones like iPhones are vulnerable to such attacks.
● Any
app with access to Bluetooth can record users conversations with Siri and audio
from the iOS keyboard dictation feature when using AirPods or Beats headsets,
some app developers say.
● Through
a process called bluebugging, a hacker can gain unauthorized access to these apps
and devices and control them as per their wish.
Bluebugging:
● It
is a form of hacking that lets attackers
access a device through its discoverable Bluetooth connection.
● Once
a device or phone is bluebugged, a hacker
can listen to the calls, read and send messages and steal and modify contacts.
How does Bluebugging hack devices?
● Several
smartphones have their Bluetooth settings on discovery mode as it is a default
setting, making it easy for hackers to access the phones when they are within
10metres from the device.
● Once
a connection is established, hackers can use brute force attacks to bypass
authentication.
● They
can install malware in the
compromised device to gain unauthorized access to it.
Which devices are most susceptible to such attacks?
● Any Bluetooth-enabled
device can be bluebugged. Wireless earbuds are
susceptible to such hacks.
● Apps
that enable users to connect to their TWS (True Wireless Stereo) devices or
earbuds can record conversations.
● The
apps of these TWS devices can record conversations.
● Once
hacked, the attacker can make and listen to calls, read and send messages, and
modify or steal your contacts.
How to prevent bluebugging?
● Turning
off Bluetooth and disconnecting paired Bluetooth devices when not in use.
● Updating
the device’s system software to the latest version.
● Limiting
the use of public Wi-Fi.
● Using
VPN as an additional security measure.
● Modern
anti-virus softwares can also help thwart such attacks.