Hacking through Bluetooth : Aware about what is Blue Bugging ?

By | September 27, 2023
bluetooth hacking

Whether it’s a digital watch on your wrist or an ear pod on your ear, Bluetooth is enough to connect to your phone. As part of hands-free technology, wireless technology is widely used by young and old alike. Recently, with the availability of earphones and digital wristwatches, the use of Bluetooth has increased significantly.

However, cybercriminals are weaponizing it. This hack is called ‘Blue Bugging’. ‘Bluebugging’ hacking targets Bluetooth enabled phones. Therefore, cybercrime police warned to be cautious. The police informed that cases are being registered across the country.

What is blue bugging?

Pon hacking is usually done by sharing links through messages. But blue bugging targets phones that have Bluetooth enabled. When in public places, Bluetooth-enabled phones within a 10-meter range will connect to the phone by sending a request via Bluetooth. They will change their Bluetooth name to the company name of the phone and other gadgets used by other people and send a connection request.

Some types of malware are secretly sent to our phones without receiving any messages. Then it will take full control of the phone. By sending malware they grab our phone contacts, photos and other important information and then threaten. This method is widely used in foreign countries

These are the precautions..!

  • Bluetooth should be turned off if not needed in public places
  • Unrecognized devices and strangers should not respond to pairing requests sent via Bluetooth
  • Unpair with connected Bluetooth devices after need
  • Do not use free Wi-Fi at bus stands, railway stations and public places.
  • Fluctuations in data should be monitored. Use a VPN for added security