Concerned over an increase in instances of cybercrime, Andhra Pradesh police recently asked the people to be wary of "bluebugging."
- What is it? It is a form of hacking that lets attackers access a device through its discoverable Bluetooth connection.
- Once a device or phone is bluebugged, a hacker can listen to the calls, read and send messages and steal and modify contacts.
- It started out as a threat for laptops with Bluetooth capability. Later hackers used the technique to target mobile phones and other devices.
- This attack is often limited due to the range of Bluetooth connections, which goes up to only 10 meters.
- Bluebugging attacks work by exploiting Bluetooth-enabled devices.
- The device’s Bluetooth must be in discoverable mode, which is the default setting on most devices.
- The hacker then tries to pair with the device via Bluetooth.
- Once a connection is established, hackers can use brute force attacks to bypass authentication.
- They can install malware in the compromised device to gain unauthorised access to it.
What is a Malware?
- Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.
- Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware.
- These malicious programs steal, encrypt and delete sensitive data; alter or hijack core computing functions and monitor end users' computer activity.
Q1) What is ransomware?
Ransomware is malware that employs encryption to hold a victim’s information at ransom. A user or organization’s critical data is encrypted so that they cannot access files, databases, or applications. A ransom is then demanded to provide access. Ransomware is often designed to spread across a network and target database and file servers, and can thus quickly paralyze an entire organization.