Expert warns of scammers “Bluejacking” your devices
Bluetooth blues: The hidden cost of wireless freedom
The single innocent press of a button could open your device to hackers lurking a soccer field away
Bluetooth technology is integrated into almost every device we use — from wireless headsets and speakers to smart home devices and even cars. While it offers unmatched convenience, it also harbors hidden dangers that every user should be aware of.
According to the 2024 Bluetooth Market Update, the number of these gadgets is likely to grow. Annual Bluetooth device shipments worldwide reached five billion units in 2023, with a projected annual growth rate of eight percent through 2028.
“The dark side of Bluetooth technology lies in its vulnerabilities. For example, simply pressing one button can put your device in ‘discoverable’ mode. Once enabled, this setting allows hackers to easily exploit weaknesses and bypass even the most advanced security measures on your devices, enabling them to install malware or steal sensitive personal data,” says Marijus Briedis, chief technology officer (CTO) at NordVPN.
The closer the hacker, the greater the threat
Bluebugging is considered the most dangerous type of Bluetooth attack because it not only allows hackers to access data but also grants full control of the device. Attackers can use a victim’s device to make calls, send texts, access the internet, and even eavesdrop on conversations without the owner’s knowledge.
“A Bluetooth-enabled device’s range is only about 10 meters, so the greater the distance they are from a potential hacker, the safer the device owner is. The worst attacks occur within that 10-meter range. However, less harmful attacks can be launched from as far as 100 meters, roughly the length of a football field,” says Briedis.
“Such attacks are called Bluesnarfing and Bluejacking, which generally involve mere annoyance and data theft. In a Bluesnarfing attack, a hacker steals information from your phone, including calendars, emails, texts, photos, and videos. Bluejacking is more like spamming your device with unwanted messages or advertisements. Hackers can also use it to make international or expensive pay-per-minute calls and drain your hard-earned money,” says Briedis.
Not just phones: How hackers use Bluetooth to infiltrate your car
It’s not only smartphones or laptops that can be hacked via Bluetooth — smart home devices are also a prime target for hackers. The 2024 IoT Security Landscape Report reveals that home network devices experience an average of 10 attacks every 24 hours. Among the most targeted are smart security cameras, baby monitors, smart door locks, and even smart TVs. But we can take our thinking a step further and talk about cars.
“Did you know that hackers can listen to your hands-free conversations and even talk directly to people in your car using just a laptop and a Bluetooth antenna? This hacking method, called ‘Car Whisperer,’ exploits weak Bluetooth security. If you don’t change your car’s default Bluetooth PIN code (often 0000 or 1234), hackers can easily gain access and spy on you,” says Briedis.
How to protect your devices from Bluetooth attacks
Marijus Briedis, CTO at NordVPN, advises users to take these steps to prevent Bluetooth attacks:
- Disable Bluetooth when not in use. Turning off Bluetooth when it’s not needed significantly reduces the risk of exposure. It’s also advisable to set your Bluetooth visibility to hidden.
- Make Bluetooth devices undiscoverable. Access your device’s Bluetooth settings to make it undiscoverable. This adjustment prevents hackers from seeing and attempting to pair with your device.
- Reject unfamiliar connection requests. To protect against potential attacks, avoid accepting Bluetooth connection requests from unknown sources, especially in public spaces. Additionally, always reject and delete messages from strangers and never click on links within them. These links could download malware onto your device, potentially leading to large-scale data theft.
- Set passwords for connections. Secure your Bluetooth connections with passwords to prevent unauthorized devices from connecting automatically.
- Monitor for sudden spikes in data usage. Keep an eye on your data consumption. If you notice an unreasonable surge, it could indicate that someone is controlling your device or using it as part of a botnet, significantly increasing data usage.
- Watch out for suspicious activity. If your phone unexpectedly disconnects calls or you find messages not sent by you, it might mean your device is compromised. Consider resetting your device to factory settings or uninstalling unfamiliar apps.
ABOUT NORDVPN
NordVPN is the world’s most advanced VPN service provider, chosen by millions of internet users worldwide. The service offers features such as dedicated IP, Double VPN, and Onion Over VPN servers, which help to boost your online privacy with zero tracking. One of NordVPN’s key features is Threat Protection Pro™, a tool that blocks malicious websites, trackers, and ads and scans downloads for malware. The latest creation of Nord Security, NordVPN’s parent company, is Saily — a global eSIM service. NordVPN is known for being user friendly and can offer some of the best prices on the market. This VPN provider has over 7,300 servers covering 118 countries worldwide. For more information, visit https://nordvpn.com.
https://unsplash.com/s/photos/bluetooth