Bluebugging

Bluetooth cyberattack


title: "Bluebugging" type: doc version: 1 created: 2026-02-28 author: "Wikipedia contributors" status: active scope: public tags: ["bluetooth", "hacking-(computer-security)"] description: "Bluetooth cyberattack" topic_path: "technology/computing" source: "https://en.wikipedia.org/wiki/Bluebugging" license: "CC BY-SA 4.0" wikipedia_page_id: 0 wikipedia_revision_id: 0

::summary Bluetooth cyberattack ::

::figure[src="https://upload.wikimedia.org/wikipedia/commons/f/fc/BluetoothLogo.svg"] ::

Bluebugging is a form of Bluetooth attack often caused by a lack of awareness. It was developed after the onset of bluejacking and bluesnarfing. Similar to bluesnarfing, bluebugging accesses and uses all phone features but is limited by the transmitting power of class 2 Bluetooth radios, normally capping its range at 10–15 meters. However, the operational range can be increased with the use of a directional antenna.{{cite journal |author=Bluejackingtools |date=2005-08-04 |title= Bluebugging and Bluejacking |publisher=Bluejackingtools |url=http://www.bluejackingtools.com/bluebugging |archive-url=https://archive.today/20130118071500/http://www.bluejackingtools.com/bluebugging |url-status=usurped |archive-date=January 18, 2013

History

Bluebugging was developed by the German researcher Martin Herfurt in 2004, one year after the advent of bluejacking. Initially a threat against laptops with Bluetooth capability, it later targeted mobile phones and PDAs.

Bluebugging manipulates a target phone into compromising its security, this to create a backdoor attack before returning control of the phone to its owner. Once control of a phone has been established, it is used to call back the hacker who is then able to listen in to conversations, hence the name "bugging". The Bluebug program also has the capability to create a call forwarding application whereby the hacker receives calls intended for the target phone.

A further development of Bluebugging has allowed for the control of target phones through Bluetooth phone headsets, It achieves this by pretending to be the headset and thereby "tricking" the phone into obeying call commands. Not only can a hacker receive calls intended for the target phone, they can send messages, read phonebooks, and examine calendars.

References

References

  1. (2007-10-23). "Bluetooth Devices Easily Hacked". Cape Town 24 News.
  2. [http://seclists.org/fulldisclosure/2006/Jun/551 "Buffer Overrun in Toshiba Bluetooth Stack for Windows"], ''Seclists.org''; retrieved 3 April 2011
  3. (2004-10-01). "Mobile Phones as Computing Devices: The Viruses are Coming!". IEEE Pervasive Computing.
  4. Gary Legg. (2005-08-04). "The Bluejacking, Bluesnarfing, Bluebugging Blues: Bluetooth Faces Perception of Vulnerability".

::callout[type=info title="Wikipedia Source"] This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page. ::

bluetoothhacking-(computer-security)