Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267

How hackers utilize Bluetooth-enabled devices to steal data | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


<!–

Uday Deb
–>

The World Bank in its World Development Report 2021: Data for Better Lives, affirmed that global online traffic has increased by 50% due to lockdowns and distance working, opening up wider courses of cybercriminal action.

Talking of India in the same year, based on Statista’s 2022 report, there was a clear jump in cybercrime, with over 52,000 cases being logged. And, as cyber threat keeps terrorizing, there’s a new way now faring well with hackers and adding to our worry—Bluebugging.

Is Bluebugging the same as computer bugs?

No. Computer bugs are errors in the coding or some fault in the design of a computer program that can lead to odd behaviour or the production of inaccurate or unexpected results. The bugs may cause unintended text formatting, software crashes, computer freezes, or something as serious as hardware damage. The consequences of these bugs, however, are still far subtler than those of Bluebugging.

Bluebugging refers to attacks on devices equipped with Bluetooth technology – a handy feature inbuilt into nearly every unwired gadget these days. Where your mobile computers like laptops, tablets, smartphones, smartwatches, air buds, carputers, etc., are simplifying communications for you, they are also putting your virtual property at risk via Bluetooth.

How is Bluebugging perpetrated?

MAC (Media Access Control) addresses, which are made of random, unique numbers, enable Bluetooth devices to connect with one another on a network. Once compromised, replay attacks can be used to track a device user’s activities.

First, a hacker attempts to pair with a Bluetooth-enabled device. Once connected, the hacker can avoid authentication through brute force attacks. This involves the trial-and-error method to find login credentials and encryption keys or locate a concealed webpage.

Next, malware is secretly installed on the device to gain further access to the device.

The hacker can then view your contacts, read your messages, listen to and even record your calls, and misuse your emails. Your personal gallery is not safe either.

Who is more susceptible to Bluebugging?

THOSE WHO DO NOT

Tap Bluetooth off when you’re done using it on your devices. A Class-2 Bluetooth radio, which is frequently used in contemporary gadgets, has a discoverable range between 10 and 15 meters. Any device having this class of Bluetooth radio is accessible, not just your phone. With an amplified antenna, threat actors can also widen that range.

  • Use new, uncommon passwords and change them periodically.

Regardless of what device you want to secure, using a strong password is your first layer of protection in your fight against cyber criminals. According to the LastPass 2022 Review, employees repeat passwords 13 times on average. Reusing passwords poses a significant security concern since someone who already has your sensitive details may use them repeatedly to break into your other accounts.

Because of this, make sure your passwords are strong enough or get a good password manager to assist you.

  • Avoid pairing with unrecognised devices.

It’s best to not pair with any device you don’t recognize or trust. Do not accept Bluetooth messages from strangers either.

Your data is also your property and should only be accessible to you or others with your permission. Don’t save certain information on Bluetooth-active devices if you’re concerned about having it stolen.

Keep updating your computer systems to the latest versions and for having advanced security features. This is vital because Bluebugging attackers avail themselves of software imperfections. This will guarantee that your defences are always up to date.

Other preventive measures against data theft include installing a reliable antivirus program, employing a VPN as an additional layer of security, and continuously monitoring abrupt jumps in your data usage. Additionally, you can raise your cybersecurity degree with national aid like the Cyber Swacchta Kendra.

By taking these highly necessary actions, you can prevent your device from getting Bluebugged. Now that you know what to do, enjoy a safe and fun time online.

FacebookTwitterLinkedinEmail


Disclaimer

Views expressed above are the author’s own.

<!–

Disclaimer

Views expressed above are the author’s own.

–>

END OF ARTICLE


  • It’s really basic: VP’s right on judiciary’s overreach but SC’s basic structure doctrine must stay, it’s good for robust democracy

  • Why does justice wear sahib’s robes? British Raj trappings, originally meant to cow down Indians and signal imperial superiority, make our courtrooms intimidating for ordinary people seeking redressal

  • History writing: Scholars stepping in where professionals fear to tread

  • Be wise, Centre & SC: Better than court’s stand & GoI’s proposal is revising the collegium’s memorandum of procedure

  • Haldwani’s lesson: Abrupt eviction is no answer to encroachment

  • Old poison scheme: GoI must build a consensus against old pension system

  • The guvs are off: Governors in some opposition-ruled states are keeping bills pending for long, violating constitutional spirit

  • Mixed benches, please: Women, SCs, STs, OBCs & minorities are hugely underrepresented in higher judiciary. Correct this

  • Remove Raj from Raj Bhawans: Governors are necessary. But as recent controversies like those in Tamil Nadu demonstrate, they must be made accountable to not just the Union but the state and Rajya Sabha as well

  • Share, don’t gag: NDMA edict to govt scientists on not talking about Joshimath will help no one, including government

——————————————————–


Click Here For The Original Story From This Source.

National Cyber Security

FREE
VIEW