How Hackers Hack Via Charging Cable & Port

preview_player
Показать описание
How Hackers Hack Via Charging Cable & Port and how you can protect yourself from it. are you traveling and suddenly find out your phone's charge is low, You're in an airport, hotel, or restaurant, desperately needing to recharge your cell phone. You plug it into a public USB charging station, but you may have plugged it right into the hands of a hacker. It's called "juice jacking," where a cyber thief can either hack into the charging phone to steal data or download malware or a virus that is then downloaded through the USB port onto your phone while it's charging. What is juice jacking? Juice jacking is a security exploit in which an infected USB charging station is used to compromise devices that connect to it. The exploit takes advantage of the fact that a mobile device's power supply passes over the same USB cable the connected device uses to sync data. How juice jacking works? Juice jacking is a hardware-focused man-in-the-middle attack. Juice jacking exploits are successful because the same port used to charge a device also transfers data. USB ports and phone charging cables are the most common devices used in juice jacking attacks. Other less common devices may include USB ports in video arcade consoles and portable battery power banks. Types of juice jacking attacks? Data theft. In data theft juice jacking attacks, users are not aware their sensitive information has been stolen. Malware installation. When malware installation juice jacking attacks occur, malware placed on the device may do a great deal of damage, including manipulation of a phone or computer, spying on a user, locking the user out of the device or stealing information. Multidevice attack. On top of harming the device plugged into a compromised charger, a device charged by infected cables may, in turn, infect other cables and ports with the same malware, becoming an unknowing carrier of the virus. Disabling attack. Some malware uploaded through a charging device can lock owners out of their devices, giving full access to the attackers. Juice jacking history? Juice jacking emerged at the DEF CON hacking conference in August 2011. Conference attendees were offered free charging stations for their mobile devices. When they plugged them in, a message appeared warning them not to trust convenient but suspicious offers of free charging because the devices could be loaded with malicious code. How to prevent juice jacking? Carry a portable battery charger of your own. Use a USB device called a data blocker that connects to your phone's charging cable. Use the wall plug-in socket to charge your phone. Completely power off your device before plugging it into a cellphone charging. comment if you fear this could happen to you. Don't forget to subscribe.
#hack #hacking #juicejacking
Рекомендации по теме
Комментарии
Автор

My charging port is not working, and I have many problems faced regarding hacking. Phone was heat by more than 40 -55 temperature. when I access phone all applications open at the same time. Icons are added by default. Unable to charge my phone

staffchiefconsultants
Автор

So maybe even a "local mobile shop / repairer"
Could have such devices installed in the shop and just plug the phone and steall your data?

yourwellwisher
join shbcf.ru