We've all experienced the fear that comes with realizing your phone is ready to die when you're on the move - and the relief that comes with finding a handy location to charge it. However, security experts advise individuals to think twice before plugging in. "Juice jacking," or utilizing public USB connections to install malware on cell phones and other devices, is a growing tactic used by cybercriminals.
In the recently issued alert, bureau officials advised customers to avoid using public USB charging connections at airports, malls, and hotels, citing the possibility that hackers may exploit the chance to access a person's phone or tablet.
"Bad actors have worked out ways to use public USB ports to introduce malware and monitoring software onto devices," the FBI's Denver office recently stated via Twitter.
The FBI's alert is part of an attempt to ensure that your personal data, such as credit card numbers, login credentials, images, videos, and other information, does not get into the wrong hands.
According to the Washington Post, the term "juice jacking" was developed in 2011 when researchers built a charging station to demonstrate the possibility of tampering at such kiosks. In 2021, the FBI and the Federal Communications Commission (FCC) issued identical warnings using the term.
When asked about the most recent updates, authorities told Axios that they were part of a regular warning of the problem. It's unclear how often "juice jacking" occurs, as few cases of virus theft have been reported publicly. Experts have cautioned, however, that total access to a person's phone via "juice jacking" might provide hackers access to personal data, including credit card information.
HOW JUICE JACKING WORKS?
As you may have observed, charging your phone via the USB port of your computer or laptop also allows you to transfer data back and forth between the two platforms. This is because a USB port is more than just a power outlet. A standard USB connection includes five pins; however, only one of them is required to charge the receiving end. Two of the others are automatically utilized for data transfers.
Except for smartphones running earlier Android versions, the data transmission option is disabled by default unless you adjust your settings. The connection is only viewable on the end that delivers power, which is often not the device owner in the instance of juice jacking. That implies that if a user plugs into a USB connection to charge their smartphone, they may also be opening a channel for data to transfer between devices, which threat actors might exploit to steal information or install malware.
PRACTICE SAFE CHARGING:
The most apparent strategy to avoid juice jacking is to steer clear of public charging stations and portable wall chargers. Don't allow the anxiety of an almost depleted battery to overcome you.
If going without a phone seems insane, and you need a battery charge to get you through the remainder of your journey, a good old-fashioned AC socket (plug and outlet) will suffice. While charging, no data may be transferred—though it may be challenging to find an empty plug. Make sure you have the proper adaptor for the various power outlet systems along your trip. It should be noted that there are 15 main varieties of electrical outlet plugs in use now all over the world.
External batteries, Bluetooth-equipped charging stations, and power banks are other non-USB solutions. Power banks are gadgets that can be charged to contain sufficient juice to recharge your phone numerous times. They can contain between two and eight full charges based on the kind and brand of power bank.
If you still wish to connect through USB, you can use USB condoms, which are adaptors that enable power transfer but do not connect the data transfer ports. As an "always on" protection, you may connect them to your charging cord.
FINAL THOUGHTS:
The practice known as "juice jacking" is not a new one. It's been around for a while, but a recent tweet from the FBI branch in Denver has reignited the notion and the need for watchfulness. It's important to be attentive in this era of high cybercriminal activity to make sure that you are safe and well away from these cyber attackers and their unethical activities.
