You are on page 1of 1

Junaid khan

Eavesdropping Attack
An eavesdropping attack occurs when a hacker intercepts, deletes, or modifies data that
is transmitted between two devices. Eavesdropping, also known as sniffing or snooping,
relies on unsecured network communications to access data in transit between devices.

To further define eavesdropping, it typically occurs when a user connects to a network in


which traffic is not secured or encrypted and sends sensitive business data to a
colleague. The data is transmitted across an open network, which gives an attacker the
opportunity to intercept it via various methods. Eavesdropping attacks can often be
difficult to spot. Unlike other forms of cyber-attacks, the presence of a bug or listening
device may not adversely affect the performance of devices and networks.

Eavesdropping Methods
With eavesdropping, attackers can use various methods to launch attacks that typically
involve the use of various eavesdropping devices to listen in on conversations and
network activity.

A typical example of an electronic listening device is a concealed bug physically placed


in a home or office. This could occur by leaving a bug under a chair or on a desk, or by
concealing a microphone within an inconspicuous object like a pen or a bag. This is a
simple approach but could lead to more sophisticated, difficult-to-detect devices being
installed, such as microphones within lamps or ceiling lights, books on a bookshelf, or in
picture frames on the wall.

Despite all the technological advances making digital eavesdropping increasingly easy,
many attacks still rely on intercepting telephones. That is because telephones have
electric power, built-in microphones, speakers, space for hiding bugs, and are easy to
quickly install a bug on. Eavesdropping attackers can monitor conversations in the room
the telephone is in and calls to telephones anywhere else in the world.

You might also like