If not redirected, please click here https://www.thesecuritybuddy.com/bluetooth-security/what-is-bluesnarfing/
BlueSnarfing is the illegal theft of
information from Bluetooth enabled devices. Using BlueSnarfing,
attackers take advantage of security vulnerabilities of Bluetooth
software and access Bluetooth enabled devices illegally, without the
consent of the owners of the devices.
Purpose of BlueSnarfing
Attackers use BlueSnarfing to illegally
access information of the Bluetooth enabled devices. Attackers can
steal information like user's contact list, text messages, email
messages etc using this method. This is a completely illegal as it
invades privacy of users.
How is BlueSnarfing done ?
Bluetooth enabled devices communicate
with each other using a protocol called OBEX or OBject EXchange.
BlueSnarfing uses security vulnerabilities of that protocol.
In BlueSnarfing, the attacker first
scans for Bluetooth enabled devices, especially in public places.
Then they pair with those devices without the users' consent. The
attackers normally use some software to do BlueSnarfing. These
software enable them to get illegal access of those devices, using
which they get control of the information stored in the devices.
Adam Laurie of A. L. Digital first
discovered this vulnerability in 2003. And, since then this attack
has affected many users. There are quite a number of software
available which can enable attackers to make this attack.
How to prevent BlueSnarfing ?
The most common way of mitigating this
attack is to disable Bluetooth of devices in public places or
whenever it is not needed.
One can change settings of devices to
make the devices non-discoverable when not needed. This will prevent
the devices from being listed to the attackers when the attackers
scan for Bluetooth enabled devices in nearby places. But, this
cannot prevent BlueSnarfing of those devices conpletely. Beecause,
attackers can use a device's MAC address to pair with a Bluetooth
enabled device, even when it is in non-discoverable mode. Each
Bluetooth device has a unique 48 bit MAC address, which consists of
first 24 bits of manufacturer specific information and remaining 24
bits of unique information specific to the device.
How to know whether I am BlueSnarfed ?
One way of detecting whether a user is
BlueSnarfed is to use some software. The same software which are used
for BlueSnarfing can be used for protection also.
Using these software a user can find
out all the devices that are paired with his device and see if there
is any unauthorized pairing of devices. But, if you are using these
software, please make sure to use that responsibly, because these
software when are used otherwise, is a legal offence.
So, beware of security vulnerabilities
of your devices so that you can protect those in a better way and
stay safe, stay secured.
Read More
What is BlueJacking ?
What is BlueBugging ?
What is BlueSniping ?
What is BlueSmack Attack ?
What is BlueDump ?
What is BluePrinting ?
What is BlueBump Attack ?
Read More
What is BlueJacking ?
What is BlueBugging ?
What is BlueSniping ?
What is BlueSmack Attack ?
What is BlueDump ?
What is BluePrinting ?
What is BlueBump Attack ?
No comments:
Post a Comment