Bluebugging: A Cyberattack that Abuses Bluetooth Connectivity and Steals User data

What is blue bugging?

Blue bugging is a type of hacking which hackers use to get into users’ devices with discoverable Bluetooth connectivity connections. The devices which are hacked through this technique are called being blue bugged. Once a device is bluebugged, hackers can access contact information, tap calls, view and send messages, and more.

Bluebugging was earlier used to compromise laptops or computers with Bluetooth connectivity. Later, hackers used this method to compromise mobile phones and other devices. Martin Herfurt, an independent cybersecurity security researcher, claimed that the flaw was able to get the user’s call log and call history for abusing a flaw in the Bluetooth protocol. 

Device with Bluetooth connectivity more vulnerable to Bluebugging

The devices with Bluetooth functions can be bluebugged. Threat actors use wireless earphones execute this technique. Hackers can record the conversations of users via apps that connect to TWS (True Wireless Stereo) earphones or other devices. Once the device is bluebugged, the hacker has access to your contacts and can modify or overtake them, perform and record chats, view and send messages, and much more. 

How does Bluebugging work?

Hackers use Bluetooth connection to hack the Bluetooth enabled

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

Read the original article: