charging

A data theft juice jacking attack is a kind of attack which happens through the charging phase.
Because the device is charging, hackers steal data from the target device. [newline]The State Bank of India in addition has cautioned people against the trick.
“Think twice before you plug in your phone at charging stations. Malware may find a means in and infect your phone, giving hackers ways to steal your passwords and export your computer data,” it had said.
One more point to keep in mind is that many anti-juice jacking methods involve using authorized cables and adaptors.

  • When your battery is dying and you’re nowhere near a power outlet, would you connect your phone to any old USB port?
  • It’s tempting to use a public kiosks or USB charging port when you see your phone or device includes a low battery; however, these charging ports could be tampered with to steal data while your device is being charged.

Juice jacking occurs whenever a malicious actor has infected a USB port with malware.
That typically occurs on public charging stations you find in airports, shopping centers, and coffee shops, among other areas.
In reaction to juice jacking, Apple and Android updated their devices to warn users whenever they charge and allow an individual to select whether to trust the charging port, power bank or other charging process.
If users choose the untrusted device option, their devices will only be charged and can not allow data transfer.
They utilized inexpensive hardware components to create a small sized malicious wall charger which could infect an iPhone with the then-current version of iOS with malicious software although it was being charged.
The program could defeat any security measures included in iOS and mask itself in the same way Apple masks background processes in iOS.

Preventing Juice Jacking

The third way to avoid juice jacking attacks via software security measures is to disable the choice for automatic link with another device with a charging cable .
Devices running the iOS operating system come with this feature enabled automagically.
Android users will need to ensure that you turn this option on via the Settings menu.
To avoid disabling juice jacking attacks users should again avoid public charging facilities and carry their original charging cables.

Juice jacking first came into the public conversation at a hacking conference called DEF CON in August 2011.
Conference attendees were offered free charging stations for his or her mobile devices.
When they plugged them in, a message appeared warning them not to trust convenient but suspicious offers of free charging as the devices could be packed with malicious code.
Using software security measures to guard against juice jacking attack is another reason to make certain the smartphone device remains updated continuously and hence get access to the latest software security measures.
Power banks are exponentially safer than public charging ports and, best of all, the smartphone owner doesn’t need to run around looking for a charging port.

Types Of Juice Jacking Attacks

USB ports and phone charging cables will be the most common devices used in juice-jacking attacks.

  • USB pass-through devices act as a security buffer between your public charging station’s USB port and the user’s USB charging cable.
  • Another way to protect yourself against juice jacking may be the use of USB data blockers, a little device that could be purchased relatively cheaply and placed on any USB cord before plugging it into a public USB charging outlet.
  • Police and Banks have already been warning people against ‘Juice Jacking’ time and again.
  • No doubt you’ll have your cellular phone or another portable device, and you will have to re-charge it at some time.
  • For this reason, mobile device owners should avoid public USB charging cables and only use official cables where possible.

Similar Posts