April 30, 2025
Trending News

Three ways to steal data from a mobile phone or computer via Bluetooth

  • February 16, 2023
  • 0

There are several methods by which criminals can send and steal information from users. Bluetooth It connects almost everything today, and because of that, it has also become

Three ways to steal data from a mobile phone or computer via Bluetooth
There are several methods by which criminals can send and steal information from users.

Bluetooth It connects almost everything today, and because of that, it has also become an avenue for attacking devices and stealing data. Since the appearance of this technology in the early 2000s, there have been cases of cybercrime where information can be captured, controlled or inappropriate content can be sent to users.

Bluejacking, Bluesnarfing and Bluebagging There are 3 most popular modalities.

You may also be interested in: WhatsApp and Facebook scam alert promising van raffle

What is Bluejacking?

It is a method that allows a person to send messages to any device using Bluetooth. This is done by considering the access range of this type of connection.

To do this, cybercriminals take advantage of devices that have this feature activated and send content, sometimes bypassing access permissions, and in others simply creating an alert to attract attention and then transmitting the content.

This is a modality of many stories, as it is estimated that between 2001 and 2003, the first attack was carried out by a cybercriminal named “Ajack” who sent content from his phone. Erickson again Nokia who was close to him.

There are several methods by which criminals can send and steal information from users.

What is Bluebugging?

This modality poses a greater threat because it is the way in which they manage to hack the device and gain access to it. Once the victim accesses the spoofed link, the attacker will be able to take full control.

Among the features you’ll have access to are sending messages, making or tracking calls, viewing notes, viewing your calendar, and more.

This type of attack started on computers, but with the advancement of mobile phones, they have become the main target.

Given that the victim must be within 10 meters for the hack to work, attackers use booster antennas to extend the range of the attack.

You might be wondering why AIs like ChatGPT would be a problem for the environment

There are several methods by which criminals can send and steal information from users.

What is Bluebugging?

It focuses on the theft of information, especially from devices that are in public places, because there criminals can find mobile phones or computers that leave the Bluetooth connection open and therefore access them.

Once this vulnerability is discovered, they will be able to make copies of everything stored in the device’s memory, from photos, files, videos, contact lists and passwords.

All this happens without the victim noticing and with the risk that the link will be preserved if the person returns to the same place later.

You may also be interested in: This app allows you to send messages after death

How to avoid becoming a victim of cyberattacks via Bluetooth

The most important thing to miss in these three cases and more is to never keep Bluetooth enabled when not in use, because as we’ve seen, criminals are able to access devices without a person noticing or asking for permission.

It is also important not to agree to connect unknown accessories such as headphones and much less other mobile phones, as this will be an open window for sending information or theft.

Finally, it is important to regularly change passwords and verify device settings so that prior authorization is required each time a device tries to connect.


Source: Info Bae

Leave a Reply

Your email address will not be published. Required fields are marked *

Exit mobile version