Cybersecurity experts note that apps that let users connect smartphones or laptops to wireless earplugs can record conversations, and are vulnerable to hacks. Through a process called bluebugging, a hacker can gain unauthorised access to these apps and devices and control them as per their wish.
What is bluebugging?
It is a form of hacking that lets attackers access a device through its discoverable Bluetooth connection. Once a device or phone is bluebugged, a hacker can listen to the calls, read and send messages and steal and modify contacts. It started out as a threat for laptops with Bluetooth capability. Later hackers used the technique to target mobile phones and other devices.
Wireless earplug apps are vulnerable to hacks.
How does bluebugging hack devices?
Bluebugging attacks work by exploiting Bluetooth-enabled devices. The device’s Bluetooth must be in discoverable mode, which is the default setting on most devices. The hacker then tries to pair with the device via Bluetooth.
Once a connection is established, hackers can use brute force attacks to bypass authentication. They can install malware in the compromised device to gain unauthorised access to it.
Bluebugging can happen whenever a Bluetooth enabled device is within a 10-metre radius of the hacker. However, according to a blog by VPN service provider NordVPN, hackers can use booster antennas to widen the attack range.
How can one prevent Bluebugging?
Turning off Bluetooth and disconnecting paired Bluetooth devices when not in use, updating the device’s system software to the latest version, limiting the use of public Wi-Fi, and using VPN as an additional security measure are some of the ways to prevent bluebugging.