Bluetooth Attack Types
1. Bluejacking
The attacker sends an unsolicited message to a nearby
device. The type of message can be an image or text.
2. Blueborne
This type of attack is a virus that is spread through the
air. It allows the attacker to take full control of the target device. The
target device doesn’t have to be in discoverable mode for the attack to be
successful.
3. Bluesnarfing
An attacker accesses a Bluetooth device to steal contact
lists, text messages, calendars, and emails. The attackers use tools such as obexftp
and hcitool.
4. Bluebugging
This type of attack allows the attacker to enable call
forwarding on the target device, the ability to listen in all calls, and can
send messages.