Bluebugging

Prelims level : Science & Technology Mains level : GS-III Science & Technology - Awareness in the fields of it, Space, Computers, Robotics, Nano-Technology, Bio-Technology, Pharma Sector & Health Science
No Set Found with this ID

Why in News?

  • It is a form of hacking that lets attackers access a device through its discoverable Bluetooth connection.
  • Once a device or phone is bluebugged, a hacker can listen to the calls, read and send messages and steal and modify contacts.
  • Bluebugging attacks work by exploiting Bluetooth-enabled devices.
  • Once a connection is established, hackers can use brute force attacks to bypass authentication. They can install malware in the compromised device to gain unauthorised access to it.
  • Once hacked, the attacker can make and listen to calls, read and send messages, and modify or steal your contacts.
  • Any Bluetooth-enabled device including wireless earbuds are susceptible to such hacks.
  • Bluebugging can happen whenever a Bluetooth enabled device is within a 10-metre radius of the hacker.
  • Hackers can also use booster antennas to widen the attack range.
  • Apps that enable users to connect to their TWS (True Wireless Stereo) devices or earbuds can record conversations.

How can one prevent bluebugging?

  • Turning off Bluetooth and disconnecting paired Bluetooth devices when not in use,
  • Updating the device’s system software to the latest version,
  • Limited use of public Wi-Fi and
  • Using VPN as an additional security measure.
  • Monitor data usage for sudden spikes.
Share Socially