A company executive discovered that their smartphone's contact list, calendar, and private text messages had been stolen. The forensic investigation revealed that an attacker exploited a vulnerability in the phone's Bluetooth connection to gain unauthorized access and exfiltrate the data. Which of the following Bluetooth attacks MOST likely occurred?
Bluesnarfing is the correct answer as it involves the unauthorized theft of information from a device via a Bluetooth connection, which matches the scenario described. Bluejacking is incorrect because it only involves sending unsolicited messages to a device, not stealing data from it. Bluebugging is also incorrect; while it is a more advanced attack that can include data theft, its primary characteristic is gaining full control over the device to perform actions like making calls or sending messages. Bluesmacking is a denial-of-service (DoS) attack that aims to render a Bluetooth device inoperable, not to steal data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Bluesnarfing, and how does it work?
Open an interactive chat with Bash
What are the main differences between Bluesnarfing and Bluejacking?
Open an interactive chat with Bash
How can you secure a Bluetooth device against Bluesnarfing attacks?