Nowadays, many electronic devices are Bluetooth-enabled. We often use Bluetooth to transfer data from one device to another device. But hackers often take advantage of that for malicious purposes. BlueJacking is an example of such an exploit.
What is BlueJacking?
BlueJacking is a method by which hackers can send unsolicited messages to Bluetooth-enabled devices using the OBEX or OBject EXchange protocol. Using BlueJacking, hackers can send unwanted text messages, images, or sounds to other Bluetooth-enabled devices.
How is BlueJacking done?
Hackers usually select a place where there are lots of Bluetooth enabled devices present. They choose public places like malls, restaurants, etc., for that reason. After that, they search for Bluetooth-enabled devices present in nearby places. If a device is Bluetooth-enabled and discoverable, it gets listed. Now, the attackers can send unwanted data to those devices.
How serious is the threat of Bluejacking?
BlueJacking does not pose much threat to users. It sends unwanted data to devices, but hackers do not get control over the devices through Bluejacking. Hackers cannot steal sensitive data from the devices either.
How is BlueJacking different from BlueSnarfing?
In BlueSnarfing (What is BlueSnarfing?), Bluetooth-enabled devices are illegally hacked via Bluetooth. In BlueSnarfing, hackers can get unauthorized access to the target devices. They can exploit Bluetooth to gain control of the devices and steal sensitive data.
But, as discussed earlier, using BlueJacking, attackers transmit unwanted data to Bluetooth-enabled devices. BlueJacking does not provide unauthorized access to the device to the hackers. Hackers cannot control the device or steal sensitive information from that device either.
0 Comments