Attack tree

1 Enable the Bluetooth service
2 Enable the Bluetooth interface
3 Discover devices in the close environment
4 Impersonate Bluetooth information with spooftooth
5 Send message


Bluejacking transmits data to a device without the knowledge of the user. This attack can be done by sending an electronic business card via Bluetooth to a target. Instead of putting a real name in the name field, insert a message.

Bluejacking is not inherently malicious, but takes a dark turn when used for sending phishing scams, or files that intend to hack or damage the device.