Mobile phones now come with Bluetooth functionality as a standard feature in most devices. This means more and more accessories such as hands-free ear pieces and car kits are commonly used and as a result Bluetooth functionality is left active in most mobiles by the users.
Mobiles with Bluetooth activated are prone to attacks from Bluetooth hackers. So what is Bluetooth hacking and how is it done? Bluetooth hackers commonly use 3rd party software’s to gain access to your mobile via the Bluetooth short range radio feature. This enables them to steal your mobile data or even make calls from your phone.
Bluetooth hacking is becoming very popular more recently due to the increase in mobiles with active Bluetooth functionality.
There are many Bluetooth hacking tools targeting specific OS software such as Linux and have been successful in infiltrating common mobile operating systems.
In this article we will cover popular methods used by the hackers to gain access to your mobile and how you can avoid being a victim.
Bluesnarfing Bluesnarfing allows the hackers to gain access anonymously to Bluetooth enabled devices for the purpose of stealing personal information and details using a software tool.
This is one of the popular hacking methods used commonly by Bluetooth hackers. However even this tool is now finding it difficult to execute and gain access to some mobiles. This is due to new safety measures introduced by many of the latest mobiles and recently upgraded firmwares with better security features.
Bluejacking Bluejacking is very harmless to your device but can be offensive if it is misused. This method normally involves sending Electronic Business Cards to another Bluetooth device with a message in the name field. Since the Bluetooth range is typically around 10 meters the person who is initiating Bluejacking is most likely to be somewhere near-by.
Bluebugging Bluebugging is a method of hacking into Mobile phone handsets using device commands which is not noticeable by the victim.
Just in case the hacker was successful, this would give them access to nearly every activity that is running on your phone. This means they could listen to your conversation over the phone, send and receive text messages through your phone and also make calls. In most cases these calls are made to premium line numbers charging up to £1.50 a minute, while you end up paying the bill. This will generate the hackers hundreds of pounds at your expense.
The tool used for this method has similar functionalities to Bluesnarfing but has more capabilities to make use of your mobile phones features and services.
How to avoid becoming a Bluetooth Hacking victim? Do not leave your mobile phones Bluetooth ON (active) if you are not using the service. Always check in the PAIRED ITEM section to see if your mobile is connected to any Bluetooth device that you do not recognise. Where you do find an unknown pairing immediately disconnect. If you are using hands-free devices, the best option is to HIDE the Bluetooth service which is a function available on most phones.