Bluesnarfing
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)
|
Bluesnarfing is the
For a Bluesnarfing attack to succeed, the attacker generally needs to be within a minimum range of 10 meters from the target device. In some cases, though, attackers can initiate a Bluesnarfing attack from a greater distance.[3]
Description
Bluesnarfing exploits vulnerabilities in the object exchange (
Any device with its Bluetooth connection turned on and set to "discoverable" (able to be found by other Bluetooth devices in range) may be susceptible to Bluejacking and possibly to Bluesnarfing if there is a vulnerability in the vendor's software. By turning off this feature, the potential victim can be safer from the possibility of being Bluesnarfed; although a device that is set to "hidden" may be Bluesnarfable by guessing the device's
Prevalence
Attacks on wireless systems have increased along with the popularity of
Response
Bluetooth vendors advise customers with vulnerable Bluetooth devices to either turn them off in areas regarded as unsafe or set them to undiscoverable.[5] This Bluetooth setting allows users to keep their Bluetooth on so that compatible Bluetooth products can be used but other Bluetooth devices cannot discover them.
Because Bluesnarfing is an invasion of privacy, it is illegal in many countries.
Bluesniping
Bluesniping has emerged as a specific form of Bluesnarfing that is effective at longer ranges than normally possible. According to
In popular culture
In the TV series Person of Interest, Bluesnarfing, often mistakenly referred to as Bluejacking in the show and at other times forced pairing and phone cloning, is a common element in the show used to spy on and track the people the main characters are trying to save or stop.
See also
References
- S2CID 14224399.
- S2CID 33349618.
- ^ a b "Bluesnarfing: What is it and how to prevent it | NordVPN". nordvpn.com. 2021-12-23. Retrieved 2024-04-25.
- ^ Bialoglowy, Marek, Bluetooth Security Review, Part 1, http://www.symantec.com/connect/articles/bluetooth-security-review-part-1
- ^ Fuller, John, How Bluetooth Surveillance Works, http://electronics.howstuffworks.com/bluetooth-surveillance1.htm
- ^ "Wired News: Security Cavities Ail Bluetooth". www.wired.com. Archived from the original on 16 March 2005. Retrieved 12 January 2022.
- ^ "'Rifle' Sniffs Out Vulnerability in Bluetooth Devices". NPR.org.
Mark Ciampa (2009), Security+ Guide to Network Security Fundamentals Third Edition. Printed in Canada.
Roberto Martelloni's home page Archived 2017-12-27 at the Wayback Machine with Linux source code of released Bluesnarfer proof-of-concept.