Public USB chargers pose data theft risk: How to stay safe
American officials are warning about the risks associated with using public USB chargers. The so-called 'juice jacking' technique allows hackers to seize data from devices, creating a global threat. Here's how to protect yourself from this issue.
During travel or daily outings, many of us use public charging stations to recharge our smartphones. However, few realise the risks of connecting their devices to publicly available USB ports. Security experts refer to this technique as "juice jacking." This involves transferring malicious software to a device via a USB cable, which allows data transfer in addition to charging.
The history of such attacks includes cases like Mactans, identified in 2013 by the Georgia Institute of Technology, or USB Ninja, which looks like a standard cable but can install malicious software. Another example is KeySweeper – seemingly an ordinary charger that logs wireless keyboard activity and transmits data via GSM to the attacker.
How to protect yourself
In light of the growing threat, officials from Los Angeles, as well as technology portals, recommend avoiding connecting devices to public chargers. The safest solution is to use your own charger connected directly to a power outlet or to use power banks.
An innovative solution is the so-called USB Condom (SyncStop) – a special cover for the cable that blocks data transfer, allowing only charging.
Public chargers can be compared to keeping a wallet in the back pocket – nothing might happen, but there is a risk that someone could take advantage of it. In times when smartphones store our personal data, photos, and passwords, it is wise to be particularly cautious not to fall victim to scammers.
Regularly securing devices, avoiding suspicious cables, and choosing safe charging methods can protect our information from potential leakage or theft.