Bluebugging
29, Nov 2022

Prelims level : Science & Technology
Mains level : GS-III Science & Technology - Awareness in the fields of it, Space, Computers, Robotics, Nano-Technology, Bio-Technology, Pharma Sector & Health Science
Why in News?
- It is a form of hacking that lets attackers access a device through its discoverable Bluetooth connection.
- Once a device or phone is bluebugged, a hacker can listen to the calls, read and send messages and steal and modify contacts.
- Bluebugging attacks work by exploiting Bluetooth-enabled devices.
- Once a connection is established, hackers can use brute force attacks to bypass authentication. They can install malware in the compromised device to gain unauthorised access to it.
- Once hacked, the attacker can make and listen to calls, read and send messages, and modify or steal your contacts.
- Any Bluetooth-enabled device including wireless earbuds are susceptible to such hacks.
- Bluebugging can happen whenever a Bluetooth enabled device is within a 10-metre radius of the hacker.
- Hackers can also use booster antennas to widen the attack range.
- Apps that enable users to connect to their TWS (True Wireless Stereo) devices or earbuds can record conversations.
How can one prevent bluebugging?
- Turning off Bluetooth and disconnecting paired Bluetooth devices when not in use,
- Updating the device’s system software to the latest version,
- Limited use of public Wi-Fi and
- Using VPN as an additional security measure.
- Monitor data usage for sudden spikes.