Brain Booster for UPSC & State PCS Examination (Topic: Bluebugging)

Context

  • Cybersecurity experts have pointed out that apps that allow users to connect their smartphones or computers to wireless earplugs have the potential to record conversations and are vulnerable to hacks.

About the bluebugging

  • It is a form of hacking that lets attackers access a device through its discoverable Bluetooth connection.
  • Once a device or phone is bluebugged, a hacker can listen to the calls, read and send messages and steal and modify contacts.
  • The Bluetooth settings on several smartphones are in discovery mode, which makes it simple for hackers to access the phones when they are less than 10 metres away from the device.
  • Devices using short PINs for passwords can be vulnerable to these attacks and are quickly cracked using brute-force computing.

How the Devices are hacked through bluebugging?

  • Bluebugging attacks work by exploiting Bluetooth-enabled devices. The device's Bluetooth must be in discoverable mode, which is the default setting on most devices.
  • The hacker then tries to connect to the device through Bluetooth, and can employ brute force attacks to bypass authentication once a connection has been made.
  • They can install malware in the compromised device to gain unauthorised access to the device.
  • Although, bluebugging generally happens whenever a Bluetooth enabled device is within a 10-metre radius of the hacker. However, hackers can use booster antennas to widen the attack range.1

Bluebugging Prevention

  • The devices should be made undiscoverable from Bluetooth settings. This will keep them invisible to hackers, thereby not letting them pair with the device.
  • Turning off Bluetooth and disconnecting paired Bluetooth devices when not in use, updating the device's system software to the latest version can reduce the vulnerability to such hacks.
  • Further, limiting the use of public Wi-Fi, and using VPN as an additional security measure are some of the ways to prevent bluebugging.
  • Users must also watch out for suspicious activities on their devices. Moreover, they should also monitor sudden spikes in their data usage.
  • Modern anti-virus software can also help thwart such attacks, helping the users to detect strange and spam-like content by filtering, blocking and consistently reminding people to be alert

Hacking/malware attacks in India

  • The American cybersecurity company Palo Alto Networks, in 2021 pointed out that India is one of the more economically lucrative countries for hacker groups.
  • These hackers demand ransom payments from Indian companies, which are typically made with cryptocurrencies.
  • Maharashtra was the most often attacked state in India, receiving 42% of all ransomware attacks.
  • Ransomware attacks affected one in four Indian organisations in 2021, which is higher than the global average of 21%.