New ‘Bluebugging’ threat lets hackers read chats, hear calls and more: how to protect yourself


Martin Herfurt, an independent security researcher, claims that the bug can access a user’s phone book and call history by exploiting a flaw in the Bluetooth protocol. Here are more details about the threat.

How bluebugging works

Bluebugging is said to take advantage of Bluetooth-capable hardware and must be configured to be discoverable, which is basically the default setting. A hacker tries to pair with the device via Bluetooth and once the connection is established, they can use brute force attacks to bypass the authentication.

This allows a hacker to install malware on a compromised device to gain unauthorized access. When a Bluetooth-enabled device is within 10-meter range of the hacker, it can be executed. Hackers can use wireless earbuds for these types of hacks. Users can record conversations using apps that connect to TWS earbuds and other devices. Hackers have access to contacts and can change them, record chats, read and send messages, and more.

How can bluebugging be avoided?

Users can avoid bluebugging by disabling Bluetooth and removing paired devices when not in use. Furthermore, updating the system software on the device, limiting the use of open Wi-Fi and using a VPN is also an added layer of security. Another way to secure devices is to disable Bluetooth Discoverable.


Source by 91 Mobiles

Written By Sabhitech

Leave a Comment