TechBeware the charging trap: Officials warn of 'juice jacking' risks

Beware the charging trap: Officials warn of 'juice jacking' risks

American officials warn about the risks associated with using public USB chargers. The technique known as juice jacking allows hackers to capture data from devices, posing a global threat. Here’s how to protect yourself from this issue.

Do you charge your phone like that? You'd better stop. Your data could be stolen.
Do you charge your phone like that? You'd better stop. Your data could be stolen.
Images source: © Adobe Stock | PAWEL_KACPEREK

1 November 2024 21:04

Many people use public charging stations to recharge their smartphones during travel or daily outings. However, few realize the risks associated with connecting devices to publicly available USB ports. Security experts describe this technique as "juice jacking." It involves sending malicious software to a device through a USB cable, which allows data transfer and charging.

The history of such attacks includes cases like Mactans, identified in 2013 by the Georgia Institute of Technology, or USB Ninja, which appears like a standard cable but can install malicious software. Another example is KeySweeper—a seemingly ordinary charger that records wireless keyboard activity and sends the data via GSM to the attacker.

How to protect yourself

Given the growing threat, officials from Los Angeles, as well as technology portals, recommend avoiding connecting devices to public chargers. The safest solution is to use your own charger plugged directly into an electrical outlet or a power bank.

An innovative solution is the so-called USB Condom (SyncStop)—a special attachment for the cable that blocks data transmission, allowing only charging.

Public chargers can be compared to keeping a wallet in your back pocket—it doesn't have to be used, but there's a risk someone could exploit it. In times when smartphones store our personal data, photos, and passwords, it's worth being particularly cautious to avoid falling victim to fraud.

Regularly securing devices, avoiding suspicious cables, and choosing safe charging methods can protect our information from potential leaks or theft.

© Daily Wrap
·

Downloading, reproduction, storage, or any other use of content available on this website—regardless of its nature and form of expression (in particular, but not limited to verbal, verbal-musical, musical, audiovisual, audio, textual, graphic, and the data and information contained therein, databases and the data contained therein) and its form (e.g., literary, journalistic, scientific, cartographic, computer programs, visual arts, photographic)—requires prior and explicit consent from Wirtualna Polska Media Spółka Akcyjna, headquartered in Warsaw, the owner of this website, regardless of the method of exploration and the technique used (manual or automated, including the use of machine learning or artificial intelligence programs). The above restriction does not apply solely to facilitate their search by internet search engines and uses within contractual relations or permitted use as specified by applicable law.Detailed information regarding this notice can be found  here.