09 May 2011

What is a Bluejacking?

Bluejacking is a relatively new term that is used to describe the act of sending an anonymous message to other Bluetooth equipped devices that include mobile phones, laptops, printers, more recently cars, and personal data assistants (PDAs). To date, Bluejacking has primarily been done for non-malicious means by mobile users trying to have fun with others in their general proximity. The act is made possible by the nature of the Bluetooth technology being open to receiving communications within the effective range of the device in the 2.4 GHz frequency band.

How Does Bluejacking Work?

If a device has Bluetooth enabled, it can both send or receive Bluejacking messages. The message is sent anonymously from the sending device to those that are in range and open to receiving data. Bluejacking most commonly occurs in highly populated areas that people have their mobile phones on and usually with Bluetooth still turned on such as restaurants, bars, cell or mobile phone stores, airports, shopping malls, and train stations.

Steps to Bluejack Another Device

Step 1 – Create a new contact on your mobile phone’s contact list.
Step 2 – Enter your “Bluejacking” message in the name field such as “I am a master Bluejacking specialist.”
Step 3 – Choose the new contact and select the “Send via Bluetooth” menu option on your phone. The intended purpose of this option on mobile phones is to forward contact data to others, however, it can also be used to Bluejack other users.
Step 4 – Your phone will now display a list of devices that are in range of the phone. If your phone cannot find a device, it just means that you are not in range of a Bluetooth enabled device. Select a contact from the listing and send your message.
Step 5 – If you choose to Bluejack other devices, ensure you are aware of the security laws in your place of residence. In some locations, sending unsolicited messages via Bluejacking can be determined as being illegal.

How to Prevent Being Bluejacked?

To prevent being Bluejacked, all you need to do is disable Bluetooth on your mobile device when not in use. Your equipment will not show up on a “Bluejacker’s” phone when he or she attempts to send a message, and they do not queue up.

Good Practices for Bluetooth Enabled Devices

Whether you are a person who will partake in Bluejacking or just don’t want to be bothered with these messages, the following are some good practices to consider following:
  • Do not reveal who you are if you are either sending or receiving Bluejacked messages.
  • Never threaten anyone.
  • Never send messages that can be considered abusive.
  • Never reveal personal identifying information in response to a BlueJacked message.
  • Disable Blue Tooth while away from your car or home if you do not want to be a recipient of Bluejacked message.
  • If you receive a Bluejacking message, delete the message vice accepting it or it will be added to your device’s address book.

AbhiShek SinGh
Founder of 'TheHackingArticles'. Cyber Security Analyst, Cyber Security Researcher, and Software Engineer. Follow 'AbhiShek SinGh' on Facebook , Twitter or Google+ or via Email

Subscribe to stay up to date