CyberGlossary

Attacks & Threats

Bluebugging

Also known as: Bluetooth backdoor

Definition

A Bluetooth attack that gains hidden, command-level control of a victim device — beyond passive data theft — to place calls, read messages, or relay audio.

Bluebugging goes a step further than bluesnarfing. Exploiting weak pairing, default PINs, or implementation flaws in the AT command channel (commonly used to talk to phone radios), the attacker establishes a backdoor that can issue commands as if it were the device's own modem: make calls, send SMS, read contacts, or eavesdrop on audio. It historically affected Bluetooth phones with weak authentication and reappears each time a new BT stack vulnerability is disclosed. Defences: keep BT firmware patched, disable discoverability, only pair in trusted environments, prefer BLE devices that enforce LE Secure Connections, and review/remove old paired devices.

Examples

  • Forcing a vulnerable phone to dial an attacker number and acting as a covert microphone.
  • Sending SMS messages from a victim's handset via injected AT commands.

Related terms