Hackers spread their legs:
Initially this new method proved dangerous for laptops and computers. After this hackers also applied this technique on mobile phones and other gadgets. Martin Herfurt, an independent security researcher, has claimed that this bug can access users’ phone books and modify call history. Which devices are at risk:
Any gadget that has a Bluetooth function can be Bluebugged. Such hacks are possible through wireless earbuds. Using apps that connect to TWS (true wireless stereo) headphones or other devices, users can record phone conversations. Once hacked, the hacker has access to your contacts and can modify and steal them. Also can do many other things.
How Bluebugging Works:
Achats known as bluebugging take advantage of Bluetooth-enabled hardware. It is configured in the device which is usually the default setting. After this, the hacker tries to pair the device via Bluetooth. Once the connection is established, the hacker can use a brute force attack to bypass the verification. After this, malware can also be installed on the hacked device. It can be executed when a Bluetooth-enabled device is within 10 meters of the hacker.
How to Avoid the Danger:
- You should keep Bluetooth turned off when not in use to prevent bluebugging.
- The system software on the device should be updated.
- Open WiFi should not be used.
- Using a VPN is very important as it is an extra layer of security.
- Most of the gadgets are discoverable for Bluetooth which makes your gadgets vulnerable to unauthorized connections. In this case, go to the setting of the gadget and turn off this setting.