Overview of Bluejacking Attack

Thanusri swetha J October 22, 09:40 AM Technology

Bluejacking is used for sending unauthorized messages to another Bluetooth device. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers and other devices.

Bluetooth has a very small range so only when a person is within 10 (highly location dependent) meters distance of a bluejacker and his Bluetooth enabled in his device, does bluejacking happen. Bluejacking involves sending unsolicited business cards, messages, or pictures. The bluejacker discovers the recipient’s phone via doing a scan of Bluetooth devices. He would then select any device, craft a message as is allowed within the body of the phone’s contact interface. He stays near the receiver to monitor his reactions. [2]

Figure 1. Overview of Bluejacking Attack

Figure 1 shows bluejackers frequent areas with high foot traffic. They are, after all, likely to find many users with discoverable Bluetooth-enabled devices there. These places include bus and train stations, airports, shopping malls, bars, restaurants, and cafes.

The hackers then scan the area for people to send anonymous messages to. The bluejacker first sends a business card to a device owner within a 10-meter radius. If the recipient accepts it, the hacker can then send him or her a message.

To Stay Safe against Bluejacking

The best way to safeguard against bluejacking is to turn your device’s Bluetooth functionality off when it’s not in use. Do so, especially when you’re in a public place. And if you need to use your device’s Bluetooth feature, make sure your device is not discoverable. That way, you can enjoy the benefits of the technology without having to worry about bluejacking. [3]

Advantages of Blue jacking:

  • Usually, a bluejacker will only send a text message, but with modern phones it’s possible to send images or sounds as well.
  • We can easily transfer data from mobile to laptop or from mobile to mobile in a short period.
  • We can even enjoy music by wireless headphones through Bluejacking.

Disadvantages of Blue jacking:

  • Increase in the availability of Bluetooth enabled devices, these devices have become vulnerable to virus attacks and even complete takeover of devices through a Trojan horse program.
  • These may even cause irritation in any person as these are just unwelcomed messages or some jokes.
  • They can annoy anyone very easily. [1]
References:
  1. https://www.jain.software/what-is-blue-jacking/
  2. https://www.geeksforgeeks.org/what-is-bluejacking/
  3. https://www.techslang.com/definition/what-is-bluejacking/
Cite this article:

Thanusri swetha J (2021), Overview of Bluejacking Attack, Anatechmaz, pp. 51

Recent Post

Blog Archive