Smartphones have spread so widely over the past 10 years
that they have practically become a part of our daily life. When compared to
other gadgets, it provides unmatched convenience. With a phone, users may call
a cab, place food orders, make presentations, and even join an office or online
class from any location.
However, if we don't use prudence when making purchases
online, it could cost us dearly. Cybercriminals are developing clever
strategies to trick unsuspecting smartphone users into handing over their
financial information and even personal information in exchange for a ransom.
Here is a description of a recent hacking method used by
thieves to commandeer a phone via Bluebugging.
What is Bluebugging?
The hacking method known as "blue bugging" allows
someone to access your smartphone through your discoverable Bluetooth
connection. A hacker might take your contacts, read and send messages, and even
use blue bugging to listen to your calls. Attacks on laptops or PCs having
Bluetooth connectivity are known as "blue bugging." Later, hackers
attacked mobile phones and other devices using this method. According to
independent security researcher Martin Herfurt, the bug took advantage of a
hole in the Bluetooth protocol to gain access to the user's phone book and call
history.
The work process of blue bugging?
The Bluetooth-enabled gadget is hacked through Bluetooth
connectivity. Therefore, the hackers attempt to pair with the device over
Bluetooth when its Bluetooth is set to be discoverable. Keep in mind that the
majority of Bluetooth-enabled devices still have the default configuration of
being discoverable.
Hackers can disable authentication after establishing a
connection by launching brute force attacks. Then, to get unauthorized access
to the blue bugged device, the hackers put malware on it. When Bluetooth-enabled
devices are within a 10-meter range of the hacker, they can be compromised.
Strategies to safeguard your device from blue bugging attacks:
0 Comments