Date First Published: 11th May 2022
Topic: Computer Networking
Subtopic: Data Transmission Technologies
Article Type: Computer Terms & Definitions
Difficulty: MediumDifficulty Level: 5/10
Learn more about what bluesnarfing is in this article.
Bluesnarfing is a type of attack where a malicious hacker gains unauthorised access to personal information and data on a device through a Bluetooth connection, such as text messages, photos, videos, calendars, emails, and contacts without the user’s permission. This is usually performed by exploiting vulnerabilities in Bluetooth and is a very harmful attack, since it can result in data theft as the data on the device may contain private information, such as private emails, photos, and videos. However, it is not as harmful as bluebugging, where a malicious hacker establishes a backdoor on a user's device, allowing them to take over and gain remote access to a device through a Bluetooth connection.
The term ‘bluesnarfing’ is a combination of the terms ‘Bluetooth’ and ‘snarfing’. The term ‘snarf’ means to copy a file or data over a network without appropriate permission.
Almost all mobile devices must be paired in order for data to be copied from them. In the past, there have been cases of devices being bluesnarfed without pairing being allowed. After mobile phone manufacturers became aware of this vulnerability, they released security patches for Bluetooth implementations and very few mobile devices are known to be vulnerable to bluesnarfing without the device being paired to it, unless a brute-force attack is performed.
A device must have a Bluetooth connection turned on and set to discoverable in order for it to be vulnerable to bluesnarfing. A device that uses an unsecured wireless network, such as in a shop or an airport is much more vulnerable to bluesnarfing. Bluesnarfing can be prevented by:
If so, it is important that you tell me as soon as possible on this page.
Network Services Network Setups Network Standards Network Hardware Network Identifiers Network Software Internet Protocols Internet Organisations Data Transmission Technologies Web Development Web Design Web Advertising Web Applications Web Organisations Web Technologies Web Services SEO Threats To Systems, Data & Information Security Mechanisms & Technologies Computer Hardware Computer Software Ethics & Sustainability Legislation & User Data Protection