Scams

fraud, scams, hoax & hackers!

The bluetooth hack

Posted by Awareness

The Definition: The Bluetooth Hack. You may have never heard of the term “blue-jacking”, and you certainly hope you are never its victim. When your phone is blue-jacked, a scammer can take control of your mobile and use it to make himself quite a handsome payday, indeed.

The Mark: Any owner of a Bluetooth enabled mobile phone – if he has forgotten to disable the Bluetooth when he is not using it. As is typical, a mark is someone who is too lazy, or too careless, or too just-plain uninformed. Visitors to this site have no such excuse.

The Scam: The piece of equipment that is key to pulling off this scam is a mobile pocket PC, set up to hunt for a blue-tooth connection. Due to a flaw in many Bluetooth enabled mobile phones, a remote mobile looking for a signal can actually pick up the signal of another nearby mobile. This defect is the only crack in the armor our modern-day cons need to exploit your phone, and your wallet.

Our scammer works in any crowded public place, seemingly intent on his pocket PC, but in reality searching for a signal to blue-jack. When he finds one, he has two jobs: one is to stay in range so he can control the hijacked phone; the other is to use his PC to make a call on the hijacked line. This is where the hustler stuffs his pockets.

Prior to instituting the scam, our con men have set up a premium-rate telephone line, which will charge those who call the line £1.50 per minute of call time. So all our hustler has to do, whilst in range of the mark’s phone, is dial up the premium-rate line using the mark’s connection and keep that connection going as long as possible. Every minute that goes by makes him a little richer.

 

A few hours on the job can net the scammer hundreds of pounds, while the careless mark doesn’t even know he’s been had – until he receives his telephone bill. At that point, he (hopefully) learns his lesson. He may never be able to sort the whole thing out, and may spend days trying to figure out who lifted his phone and dialed these calls while he wasn’t looking.

The Lesson Learned: Like so many other scams, a little knowledge goes a long way towards preventing a rip-off. So does paying a little attention. Time after time, we marvel at the mark’s trusting nature and inability to watch his own valuable property. After perusing these scams, there is just no excuse for it. The lesson learned? Disable your Bluetooth when not in use. Couldn’t be simpler.

  1. Marc Said,

    Don’t most phones refuse access without the phone owner confirming with a PIN number (usually 000) ? …or is the exploit hinted to here something that circumvents the PIN?

  2. chance Said,

    how do you set up a premium rate line???

  3. SHOCKED!! Said,

    wow – i really didnt know anything like this could happen – i usually keep my bluetooth on, in university, cos i swap stuff with mates alot, and sometimes in other places like at shopping centres – well u know where i will be doing all my swapping.
    AT HOME!!

  4. Link4u_94 Said,

    This has nothing to do with the pin. This is just a plain old’n'simple bluetooth remote control hack. Usually called bluejack, (highjack the phone:) bud the software used is widely spread across the internet. it is as easy to perform as turning a computer on!

    even i, born 1994 Can do this easily.

  5. Unknowing Said,

    Can someone teach me how to do it in details???

  6. ~complicity Said,

    people, for questions unanswered here, google them. for instance, ‘how do you set up a premium rate line?’….google ‘premium rate line’. the first three results will be sponsors; choose them, any additional results or search further.

    re:bluetooth PIN. any bluetooth enabled devices will have a setting that will request a PIN or not. simply seek a device that doesnt request a PIN. as bluetooth is a wireless protocolol (hardware level application)…you will also have access to much of the mark’s device based data.

    ———————————————————————–
    my comments should not be interpreted as an invitation to commit a crime.

    ~c

Add A Comment

About Us

    About Scamplots

    First of all, all information, concepts & illustrations presented in this website are here to protect you.
    Who are we protecting you from? If you don't know the answer to this question then you shouldn't be reading this page at all.

    "If you know the enemy and know yourself, you need NOT fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle." - Sun Tzu.
    We will try to let you know as many things as possible about the enemy & the modern 'modus operandi' of crooks. However, getting to know yourself & learning to recognize newly-introduced scam/fraud patterns is your own responsibility.

    Why are we taking thing so seriously? Well, the truth is that as time passes and technology advances scams & frauds are getting more and more dangerous.

    Be Careful: If you misuse information provided in this website you might end up in jail. Again, all information in this website is here to protect you.

2008 © SCAMPLOTS.COM