Il juice jacking is a scam perpetrated by hackers which transforms a simple smartphone recharge into a real threat. More precisely it is about an attack that delivers malware through the public charging stations, now present in various Europen cities and around the world.
Juice jacking takes advantage of the different possibilities of the classic copper cable used to recharge the smartphone battery. In fact, this instrument is not limited to transmitting current. On the contrary, it also allows the passage of data and information of various kinds.
Il juice jacking expects the public column to be compromised and that malware enters the smartphones of the victims right through the charging cable. in this way thehacker accesses the device and has the opportunity to steal sensitive information of all kinds.
Fortunately, however, there are numerous avenues to follow defend against juice jacking: starting strategies and behaviors correct, until you get to physical tools and devices.
What is juice jacking
As we know, the cable that we use every day to recharge the smartphone it doesn’t just carry energy. In fact, they can also transit inside the copper cables data packets of all kinds. We can notice this, for example, when we connect the device to the PC for back up. But also download photos to free up memory space.
The hacker can take advantage of this ability of the copper cable to implement the so-called juice jacking. A scam that allows it to spread malware of all kinds on the smartphones of the victims.
According to numerous reports by IT security experts, the victims of hacker attacks and juice jacking they are constantly increasing. Cybercriminals connect with their smartphone to a USB socket of a public charging station. By forcing its operation, they manage to infect it with a malicious program.
Juice jacking is a type of hacker attack that exploits public charging stations and USB cables
The malware lies dormant until it detects the connecting a compatible device, which is promptly infected. So that’s enough recharge your device at any public facility to be potential victims of juice jacking.
The term juice jacking was coined in 2011 by a journalist specializing in cyber security. Over the past ten years, several more or less serious attacks of this type have been organized.
The moment the hacker hacks a device with juice jacking, he is theoretically able to gain access to hundreds of sensitive data: give her Photo ai messagesup to password of the authentication keys by Google.
To date, juice jacking can compromise smartphones a lot Android how much the iPhone and, more generally, i Apple mobile devices. However, there is a substantial difference to take into consideration.
Il operating system iOS integrates a protection system which prevents the automatic upload of files from external sources. It must therefore be the user ad accept the request from on-screen notifications.
They are operating system Android the speech changes depending on the version and update installed on the device. In newer versions was introduced a block system similar to the one used by iOS. In the older onesInstead, there are no security systems similar, with all the risks that arise from it.
Strategies to defend against Juice Jacking
A user who discovers the existence of juice jacking is likely to have streaks difficulty recharging the smartphone. At least in the event that he is in a situation that is not fully protected or known.
Fortunately, there are several strategies to follow to defend against this feeling of constant danger
First of all, of course, it’s good avoid recharging From one Public USBunless strictly necessary. Another tip is to keep your smartphone constantly updated. Updates bring with them solutions and fixes to bugs or vulnerabilities. So a latest device it is undoubtedly a device more ready to resist any external threats.
Finally it is certainly useful to remember about charge the smartphone battery before going out. An easy and effective method to avoid finding yourself with a “dry” battery and needing a public charging station.
Tools to defend against juice jacking
If you want, however, there are also other “physical” solutions, which allow you to stop the run of malware through USB charging. This is the case for example of the charging-only USB cable.
As mentioned, the means by which the infection occurs is the USB cable of the charger capable of transferring data packets and not just electric charge. But there are also gods charge-only USB cablesThat they are therefore not authorized to transport information and data. Using this kind of cable you can be sure that a possible malware is unable to recognize and infect a device.
Another very popular device to combat juice jacking is the so-called USB condom. It is a device with the shape and size of a USB stick, but with the ability to filter any data packets trying to pass through the cable.
Finally it is impossible not to mention the dear, old power supply: to date the safest way ever to top up your smartphone without risking any kind of damage or scam.
Power supply intended as a peripheral to be plugged into a power outlet. But also how power bank esternoto carry around to eliminate the need for a public charging station.
To know more: The complete guide to smartphones