Blue Borne Attack -Malware via Bluetooth -Over 5.3 Billion Device Affected



[INTRODUCTION]

Everyone uses Bluetooth to share the media files over the devices. User also connect the media devices such as speakers,mice and keyboard using Bluetooth to exchange data between them. But what if the this sharing medium becomes an threat and what if this threat enables the hackers to steal data from your device without your permission. Yes this has been possible and the hackers have found the vulnerability in the Bluetooth device that allows them to steal the data without connecting and pairing with the device. This vulnerability has been named as Blue Borne. In this post we will look in brief about Blue Borne Attack What it is ? How it is been used to steal data? adding further How can one be safe from this attack?

[Blue Borne Attack]

Blue Borne Attack is the attack that is being performed by the hackers on Bluetooth device with the help of the vulnerability known as Blue borne. This vulnerability is an big threat and it can steal the data from user device without leaving any foot print. Just like an Man In Middle attack. There are about 5.3 billion device over the world that are being affected by this vulnerability. It has the capacity to spread through the near by Bluetooth device wirelessly. This is too dangerous. 

[How It Works]

This vulnerability allows the hackers to establish the remote connection to a particular device. This remote connection enables the hackers to access the device. Likewise suppose your pictures and videos are saved in the gallery so if the hacker establish an remote connection to your device than all your data in the gallery whether its an picture or video is been accessible. The remote connection establish is undetectable this means user will remain unaware of its data that is been theft. Generally this remote connection is established using python script. Most of the attacks are generally been programmed using python. Python is the most used  programming language by the hackers.

[HOW TO BE SAFE HACKERS TECH WORDS]

Since this attack is widely spreading through the bluetooth we insist you to avoid the use of bluetooth device for some days. Many companies have started to roll out the security patches for the smartphones wait for your device turn and always update your device regularly. Since the updates are not being rolled out for many devices so how can we expect the security patches. For them below is the link of the app from where you can check whether your device or nearby device is being infected by this attack.

 Click here to download the app

Comments

More Post

Total Pageviews