SlideShare a Scribd company logo
THE DAILY NEWS
SATURDAY
22 September
2021
www.dailytechnologynews.com
Bluetooth Attacks and Security Tips – Awareness Results in
Better Protection
The history of Bluetooth is quite recent – the 1990s, to be
exact. Ericsson, a Swedish multinational active in the
networking and telecommunications domain, developed
Bluetooth. The name ‘Bluetooth’ comes from a renowned
10th century Danish King, Harald “Bluetooth” Gormsson,
responsible for uniting Norway and Denmark. The
Bluetooth logo is a combination of Harald’s initials.
Dr. Jaap Haarsten is the man credited with conceiving the
idea for Bluetooth, and while it was invented in 1994, the
first Bluetooth enabled consumer product was only
launched five years later in 1999. This a was a hands-free
mobile headset,and its launch was followed by the launch
of Bluetooth-enabled dongles and mice, with the first
Bluetooth-equipped mobile phone hitting the shelves in
2000.
The evolution in Bluetooth has been swift since it
came into being in the 1990s: at first limited in
reach, it has become an all-encompassing
standard that caters to multiple use cases.From
wireless music to file sharing, from device
pairing to household appliances and accessories,
the standard covers a gamut of uses.
Bluetooth can be a security risk
Any technology that has a massive and ever-
increasing market penetration will inevitably be
on the radar of hackers and cybercriminals. Their
focus is always on the number of peopleusing a
specific technology, it’s reach, and leverage. It’s
no surprisethen that there are plenty of security
risks associated with Bluetooth.
Bluetooth works by establishing a Wireless Personal Area
Network (WPAN) to connect Bluetooth enabled devices
with one another. Bluetooth-connected devices share data
with one another and you want this data to be safe and
secure. Moreover, you don’t want criminals to gain access
to your Bluetooth-enabled devices. There is a critical need
for us to be aware of the associated risks so that we can take
steps definitive steps to protect us against Bluetooth attacks.
Some common types of Bluetooth attacks:
BlueJacking
Yep, no prizes for guessing it is a combination of two
words – Bluetooth and hijacking. This is a typeof attack
in which a Bluetooth-enabled device hijacks another
Bluetooth device to send spamadvertising.
Imagine youare in a public place with the Bluetoothon your
Imagine you are in a public place with the Bluetooth on your
device switched on. There is a criminal at work in the public
space with a BlueJacking device, and they pair thedevice with
yours and starts to spend spam-styleadvertising messages. At
face value, this problem sounds like an annoyance more than
anything else, but what if one of these messages contains a
malicious link? Or is a carefully crafted message that convinces
you to share sensitive personalinformation?A BlueJacking
attempt can go from an annoyance to a critical security issue.
THE DAILY NEWS
SATURDAY
22 September
2021
BlueSmacking (A DoS or denial-of-service attack)
A DoS attack involves a server or device receiving a truckload of data
packets, or even over-sized data packets it finds difficult to handle. The
result is that thedevice shuts down or malfunctions. What if your
Bluetooth device is considered important enough to launch a denial-of-
service (DoS) attack against?
This is not as farfetched as it sounds. Today,
mobile devices are not just used for calling or
sending messages. Phones, tablets, and laptops are
being used to storeimportant information and
execute programs that have a direct impact on a
business-critical project. Now imagine a
BlueSmacking attack against numerous such
devices that are a part of a single organization.
BlueSnarfing
This is the more ‘frightening’ version of ‘BlueJacking’. While the latter
sends data, theBlueSnarfing steals data. As in all attacks which aim to
gain unauthorized access to data, you won’t realize someone has
accessed your data until it is too late.
Picture a scenario in which you are at the airport and having some free
time on your hands before you board your flight, you decide to get some
work done.
Unbeknownst to you, the person sitting next
to you is a hacker who is just waiting for an
opportunity to BlueSnarf unsuspecting users
such are yourself. If your Bluetooth is
switched on, your device is paired
clandestinely and thedata on your device is
accessed, which can include emails, text
messages, and much more.
Eavesdropping
We are living in a world where we are working from home and
attending numerous business meetings throughout theday. Many of the
headsets we use are Bluetooth enabled. Criminals can exploit
vulnerabilities in such headsets and eavesdrop on your conversations.
Here’s the really scary bit. Hackers can
eavesdrop on theconversations you are
having with the peoplearound you as well.
This is the kind of breach of privacy that
can result in bigger problems.
THE DAILY NEWS
SATURDAY
22 September
2021
The ‘opensesame’ bug
Cybercriminals can also create a backdoor on your device or laptop using Bluetooth. Once a backdoor has been
established,the attacker can have a field day as they can access all manner of sensitive information stored on this
device. You won’t realize it, but a criminal can spy on all youractivities on the device. Imagine the potential for
havoc.
How do you protect yourself?
Now that you know the security risks, how do you protect yourself?It’s not that difficult if you take the basic steps.
 Always be very aware of where your device is. Do not misplace it or forget about where you have kept it. This is
super important if you are working from a public space. Also, if you do lose your phone, make sure you can
easily lock it remotely.
 Get into the habit of not using Bluetooth to transfer sensitive information. If you do share important files, encrypt
them first.
 If you are not using your Bluetooth, turn it off. When you do this, you switch off a possiblecyberattack vector.
Documentery made by:-
Shravani S.Patil
Class:- 9th
A Roll no.:-12

More Related Content

PPTX
Technology and troop morale slide
PPTX
Revision Terrorist And Rebel Use Of It (David & Jorge)
DOC
Blue jacking
PPTX
bahan pidato public speaking
PDF
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
PDF
Horisontin takaa: Digitaalisen mediakulttuurin kehitysaskelia
PPTX
Toastmasters - Securing Your Smartphone
PPTX
mobiletelesecz - What?
Technology and troop morale slide
Revision Terrorist And Rebel Use Of It (David & Jorge)
Blue jacking
bahan pidato public speaking
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Horisontin takaa: Digitaalisen mediakulttuurin kehitysaskelia
Toastmasters - Securing Your Smartphone
mobiletelesecz - What?

What's hot (18)

ODP
Cyber Warfare - Milan 2015
PPTX
Mobileteleseczabout
PPTX
Bluetooth Hacking
DOCX
ISSC456_Final_J_Intindolo
PPT
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
PPTX
Lesson2.9 n u2l6 public keys
PPTX
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
PPTX
Mobile phones are nuisance
DOCX
Crime & technology
ODP
Cscs (4)
PDF
Evolution of information security
PPTX
Do’s & don’ts of computer security rough
PPTX
Hackers & hacktivism
PDF
Smartphone safety
PDF
Earthmouse: Mobile Guardian
PPTX
Information security consciousness
PPTX
It hotspot shield new
PPTX
Stop in the name of norton
Cyber Warfare - Milan 2015
Mobileteleseczabout
Bluetooth Hacking
ISSC456_Final_J_Intindolo
FUTURE SCHLOCK Joyce Schwarz LA FUTURISTS TALK
Lesson2.9 n u2l6 public keys
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
Mobile phones are nuisance
Crime & technology
Cscs (4)
Evolution of information security
Do’s & don’ts of computer security rough
Hackers & hacktivism
Smartphone safety
Earthmouse: Mobile Guardian
Information security consciousness
It hotspot shield new
Stop in the name of norton
Ad

Similar to Bluetooth Attacks.docx (20)

PPTX
Bluetooth network-security-seminar-report
PDF
amrapali builders@@@bluetooth hacking.pdf
PDF
Bluetooth Vulnerabilities
PDF
Bluetooth Exploitation Attackssssssssssssssssssssss.pdf
PPTX
Blue Jacking
PDF
Security threats analysis in bluetooth enabled mobile devices
PPTX
Blue jacking
PPT
Bluetooth Hacking
PPTX
Bluejacking
PPTX
Bluetooth secuirty issues
PPTX
Bluetooth secuirty issues
PPT
INTRODUCTION TO BLUETOOTH HACKING (An0n Ali).ppt
PPT
BLUETOOTH SECURITY
PPT
Bluejacking ppt
PPT
Bluejacking
PPTX
Bluetooth Network security
PPT
Bluetooth Presentation
PPT
Bluetooth1
PPTX
SEMINAR ON bluejackng
PPT
Bluejacking
Bluetooth network-security-seminar-report
amrapali builders@@@bluetooth hacking.pdf
Bluetooth Vulnerabilities
Bluetooth Exploitation Attackssssssssssssssssssssss.pdf
Blue Jacking
Security threats analysis in bluetooth enabled mobile devices
Blue jacking
Bluetooth Hacking
Bluejacking
Bluetooth secuirty issues
Bluetooth secuirty issues
INTRODUCTION TO BLUETOOTH HACKING (An0n Ali).ppt
BLUETOOTH SECURITY
Bluejacking ppt
Bluejacking
Bluetooth Network security
Bluetooth Presentation
Bluetooth1
SEMINAR ON bluejackng
Bluejacking
Ad

More from Shravani Patil (8)

PPSX
Taekwondo - The Korean Martial Art.ppsx
PPTX
Sun Temple.pptx
PPTX
Tabla Presentation.pptx
PPTX
India's Famous Hindi Author.pptx
PPTX
Poverty As A Challenge.pptx
PPTX
Aves Presentation for class 9.pptx
PPTX
𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄
PPTX
Conservation of water ppt by shravani patil
Taekwondo - The Korean Martial Art.ppsx
Sun Temple.pptx
Tabla Presentation.pptx
India's Famous Hindi Author.pptx
Poverty As A Challenge.pptx
Aves Presentation for class 9.pptx
𝑰𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝑶𝒅𝒊𝒔𝒔𝒊 𝑪𝒍𝒂𝒔𝒔𝒊𝒄𝒂𝒍 𝑴𝒖𝒔𝒊𝒄
Conservation of water ppt by shravani patil

Recently uploaded (20)

PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
August Patch Tuesday
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Mushroom cultivation and it's methods.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Encapsulation theory and applications.pdf
PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Zenith AI: Advanced Artificial Intelligence
WOOl fibre morphology and structure.pdf for textiles
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A comparative study of natural language inference in Swahili using monolingua...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
August Patch Tuesday
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Mushroom cultivation and it's methods.pdf
Chapter 5: Probability Theory and Statistics
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
A comparative analysis of optical character recognition models for extracting...
Heart disease approach using modified random forest and particle swarm optimi...
TLE Review Electricity (Electricity).pptx
Assigned Numbers - 2025 - Bluetooth® Document
Encapsulation theory and applications.pdf
Approach and Philosophy of On baking technology
NewMind AI Weekly Chronicles - August'25-Week II
Zenith AI: Advanced Artificial Intelligence

Bluetooth Attacks.docx

  • 1. THE DAILY NEWS SATURDAY 22 September 2021 www.dailytechnologynews.com Bluetooth Attacks and Security Tips – Awareness Results in Better Protection The history of Bluetooth is quite recent – the 1990s, to be exact. Ericsson, a Swedish multinational active in the networking and telecommunications domain, developed Bluetooth. The name ‘Bluetooth’ comes from a renowned 10th century Danish King, Harald “Bluetooth” Gormsson, responsible for uniting Norway and Denmark. The Bluetooth logo is a combination of Harald’s initials. Dr. Jaap Haarsten is the man credited with conceiving the idea for Bluetooth, and while it was invented in 1994, the first Bluetooth enabled consumer product was only launched five years later in 1999. This a was a hands-free mobile headset,and its launch was followed by the launch of Bluetooth-enabled dongles and mice, with the first Bluetooth-equipped mobile phone hitting the shelves in 2000. The evolution in Bluetooth has been swift since it came into being in the 1990s: at first limited in reach, it has become an all-encompassing standard that caters to multiple use cases.From wireless music to file sharing, from device pairing to household appliances and accessories, the standard covers a gamut of uses. Bluetooth can be a security risk Any technology that has a massive and ever- increasing market penetration will inevitably be on the radar of hackers and cybercriminals. Their focus is always on the number of peopleusing a specific technology, it’s reach, and leverage. It’s no surprisethen that there are plenty of security risks associated with Bluetooth. Bluetooth works by establishing a Wireless Personal Area Network (WPAN) to connect Bluetooth enabled devices with one another. Bluetooth-connected devices share data with one another and you want this data to be safe and secure. Moreover, you don’t want criminals to gain access to your Bluetooth-enabled devices. There is a critical need for us to be aware of the associated risks so that we can take steps definitive steps to protect us against Bluetooth attacks. Some common types of Bluetooth attacks: BlueJacking Yep, no prizes for guessing it is a combination of two words – Bluetooth and hijacking. This is a typeof attack in which a Bluetooth-enabled device hijacks another Bluetooth device to send spamadvertising. Imagine youare in a public place with the Bluetoothon your Imagine you are in a public place with the Bluetooth on your device switched on. There is a criminal at work in the public space with a BlueJacking device, and they pair thedevice with yours and starts to spend spam-styleadvertising messages. At face value, this problem sounds like an annoyance more than anything else, but what if one of these messages contains a malicious link? Or is a carefully crafted message that convinces you to share sensitive personalinformation?A BlueJacking attempt can go from an annoyance to a critical security issue.
  • 2. THE DAILY NEWS SATURDAY 22 September 2021 BlueSmacking (A DoS or denial-of-service attack) A DoS attack involves a server or device receiving a truckload of data packets, or even over-sized data packets it finds difficult to handle. The result is that thedevice shuts down or malfunctions. What if your Bluetooth device is considered important enough to launch a denial-of- service (DoS) attack against? This is not as farfetched as it sounds. Today, mobile devices are not just used for calling or sending messages. Phones, tablets, and laptops are being used to storeimportant information and execute programs that have a direct impact on a business-critical project. Now imagine a BlueSmacking attack against numerous such devices that are a part of a single organization. BlueSnarfing This is the more ‘frightening’ version of ‘BlueJacking’. While the latter sends data, theBlueSnarfing steals data. As in all attacks which aim to gain unauthorized access to data, you won’t realize someone has accessed your data until it is too late. Picture a scenario in which you are at the airport and having some free time on your hands before you board your flight, you decide to get some work done. Unbeknownst to you, the person sitting next to you is a hacker who is just waiting for an opportunity to BlueSnarf unsuspecting users such are yourself. If your Bluetooth is switched on, your device is paired clandestinely and thedata on your device is accessed, which can include emails, text messages, and much more. Eavesdropping We are living in a world where we are working from home and attending numerous business meetings throughout theday. Many of the headsets we use are Bluetooth enabled. Criminals can exploit vulnerabilities in such headsets and eavesdrop on your conversations. Here’s the really scary bit. Hackers can eavesdrop on theconversations you are having with the peoplearound you as well. This is the kind of breach of privacy that can result in bigger problems.
  • 3. THE DAILY NEWS SATURDAY 22 September 2021 The ‘opensesame’ bug Cybercriminals can also create a backdoor on your device or laptop using Bluetooth. Once a backdoor has been established,the attacker can have a field day as they can access all manner of sensitive information stored on this device. You won’t realize it, but a criminal can spy on all youractivities on the device. Imagine the potential for havoc. How do you protect yourself? Now that you know the security risks, how do you protect yourself?It’s not that difficult if you take the basic steps.  Always be very aware of where your device is. Do not misplace it or forget about where you have kept it. This is super important if you are working from a public space. Also, if you do lose your phone, make sure you can easily lock it remotely.  Get into the habit of not using Bluetooth to transfer sensitive information. If you do share important files, encrypt them first.  If you are not using your Bluetooth, turn it off. When you do this, you switch off a possiblecyberattack vector. Documentery made by:- Shravani S.Patil Class:- 9th A Roll no.:-12