A security analyst is investigating an incident where an executive's mobile phone had sensitive contacts, emails, and text messages stolen without their knowledge. The attack occurred while the executive was in a public place with Bluetooth enabled on their phone. Further analysis reveals that an attacker exploited an unsecured Bluetooth connection to gain unauthorized access to the device’s data. Which type of attack was used in this scenario?