Bluetooth Hacking

Cell phone

Walking around with Bluetooth enabled on your cell phones is just like presenting food to a hungry man. Hackers can easily connect to your device using simple Bluetooth Transmitter and they are then able to manipulate your device without letting you know about it. Let me first define how it happens and then we’ll go to – how to protect your device from Bluetooth hacking attacks.


1. Introduction

Bluetooth is a well-known and widely used short range wireless communication technology which uses 2.4GHz frequency range for transmission of data without any physical link. Most of the latest cell phones have the Bluetooth technology. People use it for attaching their cell phone with computers, enabling Bluetooth wireless hands-free and in-car connectivity without knowing that it is an open door to hackers. While discussing about the past, cell phones and telecommunication companies were “closed network” but as technology grew, Cell phones become more than an ordinary cell phone to a mini-computer. And so, hackers have tended their concentration towards hacking of these mini-computers or so called Cell phones.

2. How it Works

When Bluetooth is enabled on your device (cell phone or mini computer or what so ever), it is essential to broadcast the fact that “I’m ON, and I’m able to connect with other Bluetooth devices within range”. It lets the hackers know which-one is to be targeted. A hacker is simply able to download some special softwares and install it on a laptop or some other device. He can then install a Bluetooth antenna (Bluetooth Transmitter) to that computer (let’s hacker’s source device is a mini computer or a laptop) and put everything in a backpack, briefcase, or simply places it in the memory of his source device. Now, all he has to do is walk around public places where a lot of people are concentrated, and let the computer running in his bag do all the work while no one has any idea what’s happening.
These softwares are designed in such a way that they enable device constantly scan the nearby devices having active Bluetooth connections, and when such devices are found, software device can do a variety of things without letting the owner know about it. The entire process is automated for the hacker as well, so all he has to do is walk around for as long as he can and collect as much data as possible, which he can then manipulate.  Some attacks are less damaging from others, but enabled-Bluetooth allows the hacker to do many things.

It is the term associated with downloading information from a hacked device Bluetooth-enabled, and can even allow the hacker to send a “corruption code” to completely shut the phone down and make it unusable.

It involves using special software to connect to a device and silently making it call another device, usually one the hacker is using, to act as a phone bug.

3.How to Protect from hacks

The best way to avoid such attacks is to simply remember to keep the Bluetooth turned off when you’re not using it. Many people will simply put Bluetooth in “hidden”, “invisible” or “private” mode, which, they think will hide themselves from attacks. But reality is harsher then it, hackers have already figured out how to find such invisible-Bluetooth-Enabled devices. Disabling the function altogether is the only way to avoid an attack.

Leave a Reply