Bluetooth | the new threat
is there the possibility of launching hacking attacks via Bluetooth for phones and computers?
Quick information
Bluetooth is a technology that enables you to connect via the phone to another device that supports this feature, such as headphones or watches. Although the data transfer speed is somewhat modest, it provides you with advantages such as connecting to more than one device in the latest version
Bluetooth's attacks are divided into three main attacks
1- Bluejacking
It is considered the weakest in the circle, the least harmful, and the most widespread, especially for vulnerable people, and its principle depends on sending unwanted messages, such as sending pictures or videos that violate the moral level, alienating the person and disturbing the public comfort.
2-Bluesnarfing
It is one of the most dangerous attacks, the most complex and the most harmful, because in short it targets the private data on the phone, and even it is able to access your e-mail and steal passwords and data saved on the same phone and the greatest harm is that it can target the victim at a more distance From 300 meters, despite knowing that the Bluetooth range is only 10 meters, but thanks to the high technologies that are used in such a method of penetration, it is possible to target the victim 300 meters away and steal his data without knowing him. Another matter that increases the risk of this technology by penetration is that the people supervising it are very professional and professional, as a back gateway is opened to the device that enables them to fully control it and reach the limit of responding to text messages and calls and blocking some of them from the user and all this happens without knowing the user except In the event that the hacking process is tracked through a competent security company
3-Blueboard
It is considered one of the most intelligent technologies as it has the ability to access the victim's phone without pairing the attacker's phone or connecting it via Bluetooth as well. Although the victim has hidden his appearance on the Bluetooth technology, the hacker can find his device and the stronger and more intelligent is that through this method he can send malicious software through the air and settles on any Bluetooth-enabled device and here lies the strength of this technology, through which companies and individuals are targeted alike, as it is considered one of the attacks specialized in electronic espionage. And often this technology is used to steal data from a group of computers for a specific company and spread viruses for ransomware, as accessing a single device entitles them to access them.
How can these attacks be avoided?
1-Subject awareness
Most of the attacks are based on the individual's awareness of the subject of these dangerous techniques and being very wary of them, as all I was aware of any movement you take, the less damage is
2-Security updates
Make sure to do all the phone updates, especially the security ones, which reach many devices almost every month
3-Pay attention to the Bluetooth signal
Make sure to turn off the signal after the end of its use, or at least hide it, especially in public places, even when connected to the headphones or smartwatch

Comments
Post a Comment
contact me if you have any problem