www.welivesecurity.com Open in urlscan Pro
2a02:26f0:7100::1720:ee38  Public Scan

URL: https://www.welivesecurity.com/2023/06/28/avoid-juice-jacking-recharge-batteries-safely-summer/
Submission: On June 28 via api from TR — Scanned from DE

Form analysis 5 forms found in the DOM

GET https://www.welivesecurity.com/

<form action="https://www.welivesecurity.com/" class="basic-searchform imc dark col-md-12 col-sm-10 col-xs-12" method="get" role="search">
  <div class="search-input clearfix">
    <input type="text" name="s" value="" placeholder="Search..." class="imc">
    <button class="imc">
      <span class="icomoon icon-icon_search imc"></span>
    </button>
  </div>
</form>

GET https://www.welivesecurity.com/

<form action="https://www.welivesecurity.com/" class="basic-searchform imc dark col-md-12 col-sm-10 col-xs-12" method="get" role="search">
  <div class="search-input clearfix">
    <input type="text" name="s" value="" placeholder="Search..." class="imc">
    <button class="imc">
      <span class="icomoon icon-icon_search imc"></span>
    </button>
  </div>
</form>

GET https://www.welivesecurity.com/

<form action="https://www.welivesecurity.com/" class="basic-searchform imc  col-md-12 col-sm-10 col-xs-12" method="get" role="search">
  <div class="search-input clearfix">
    <input type="text" name="s" value="" placeholder="Search..." class="imc">
    <button class="imc">
      <span class="icomoon icon-icon_search imc"></span>
    </button>
  </div>
</form>

POST https://enjoy.eset.com/pub/rf

<form action="https://enjoy.eset.com/pub/rf" class="basic-searchform col-md-12 col-sm-12 col-xs-12 no-padding newsletter" method="post" role="search">
  <div class="search-input clearfix">
    <input type="text" name="EMAIL_ADDRESS_" value="" placeholder="Email...">
    <input type="hidden" name="TOPIC" value="We Live Security Ukraine Newsletter">
    <input type="hidden" name="_ri_" value="X0Gzc2X%3DAQpglLjHJlTQGgXv4jDGEK4KW2uhw0qgUzfwuivmOJOPCgzgo9vsI3VwjpnpgHlpgneHmgJoXX0Gzc2X%3DAQpglLjHJlTQGzbD6yU2pAgzaJM16bkTA7tOwuivmOJOPCgzgo9vsI3">
    <input type="hidden" name="_ei_" value="Ep2VKa8UKNIAPP_2GAEW0bY">
    <input type="hidden" name="_di_" value="m0a5n0j02duo9clmm4btuu5av8rdtvqfqd03v1hallrvcob47ad0">
    <input type="hidden" name="EMAIL_PERMISSION_STATUS_" value="O">
    <input type="hidden" name="CONTACT_SOURCE_MOST_RECENT" value="WLS_Subscribe_Form">
    <button class="button-flag"> Submit </button>
  </div>
</form>

POST https://enjoy.eset.com/pub/rf

<form action="https://enjoy.eset.com/pub/rf" class="basic-searchform col-md-12 col-sm-12 col-xs-12 no-padding newsletter" method="post" role="search">
  <div class="search-input clearfix">
    <input type="text" name="EMAIL_ADDRESS_" value="" placeholder="Email...">
    <input type="hidden" name="NEWSLETTER" value="We Live Security">
    <input type="hidden" name="_ri_" value="X0Gzc2X%3DAQpglLjHJlTQGgXv4jDGEK4KW2uhw0qgUzfwuivmOJOPCgzgo9vsI3VwjpnpgHlpgneHmgJoXX0Gzc2X%3DAQpglLjHJlTQGzbD6yU2pAgzaJM16bkTA7tOwuivmOJOPCgzgo9vsI3">
    <input type="hidden" name="_ei_" value="Ep2VKa8UKNIAPP_2GAEW0bY">
    <input type="hidden" name="_di_" value="m0a5n0j02duo9clmm4btuu5av8rdtvqfqd03v1hallrvcob47ad0">
    <input type="hidden" name="EMAIL_PERMISSION_STATUS_" value="O">
    <input type="hidden" name="CONTACT_SOURCE_MOST_RECENT" value="WLS_Subscribe_Form">
    <button class=""> Submit </button>
  </div>
</form>

Text Content

In English
 * Em Português
 * En français
 * En Español
 * In Deutsch

Menu toggle menu

 * All Posts
 * Ukraine Crisis – Digital Security Resource Center
 * We Live Progress
 * Research
 * How To
 * Videos
 * White Papers
 * Threat Reports
 * Resources
 * Our Experts

 * Em Português
 * En français
 * En Español
 * In Deutsch





Award-winning news, views, and insight from the ESET security community


AVOID JUICE JACKING AND RECHARGE YOUR BATTERIES SAFELY THIS SUMMER

Cybercriminals can use USB charging stations in airports, hotels, malls or other
public spaces as conduits for malware
Márk Szabó
28 Jun 2023 - 11:30AM
Share

Cybercriminals can use USB charging stations in airports, hotels, malls or other
public spaces as conduits for malware

Over the past 10-plus years, modern smartphones and other portable devices have
become our constant companions. These days, smartphones let us do much more than
make phone calls or send text messages. Mobile technology puts the world at our
fingertips and we use our phones in lieu of our computers for anything from
sending e-mails to booking our vacations and checking our bank accounts. Laptops
have also become more portable and travel-friendly, and their compact form
factor makes their usage convenient ‘on the road’.

However, all these capabilities come at a cost. Phones and laptops cannot stay
constantly plugged in like desktop PCs. With their often-power-hungry
processors, they will only last for a short time on a charge. This is what the
proliferation of public charging points wanted to solve by providing a
convenient way for people to plug in their devices while not at home or work.

Security-wise, however, there are concerns with these charging spots. As the
summer travel season looms, you may want to pay heed to a recent warning from
the Federal Bureau of Investigation (FBI).


FBI WARNS: AVOID PUBLIC CHARGING STATIONS

In a recent tweet, the Denver office of the FBI warned people against the usage
of free charging stations in airports, hotels, or shopping centers, as bad
actors have figured out ways to use public USB ports to introduce malware and
monitoring software onto devices.





Not unlike in earlier warnings of the same ilk, the FBI recommends that people
bring their own chargers and USB cords with them, and use an electrical outlet
instead (since adapters carry electricity, not data).

In juice jacking (a term coined by security journalist Brian Krebs in 2011), any
device that connects to such a port through a USB cable could become a victim.
Malware installed through a corrupted USB port can do a tremendous amount of
damage to a device, including locking it, exfiltrating personal data and
passwords, and giving crooks access to the device owner’s online accounts.


HACKED BY A CHARGER

We have all found ourselves needing a quick charge at some point, especially
after a long day at school or outside – places where electrical outlets aren’t
exactly easy to find. Many kids and students, for example, use public charging
spots on buses/trains or in shopping malls. The issue is that since USB outlets
are used for both charging and file transfers, their file transfer capability
can be misused for transferring malware onto a device.

Moreover, even just a regular USB cable left somewhere could be malicious,
mimicking the old tactic of “lost and found” malware-laden CDs or flash drives.

There are many types of malware that a crook could install onto your device. As
mentioned previously, they could install ransomware, which locks your phone
until you pay a “ransom,” but the promise of unlocking could be false. Likewise,
they could install spyware, tracking your habits or your physical location. Then
there are Trojans, which could serve multiple purposes, including data theft.


AWARENESS AND VIGILANCE GO A LONG WAY

Regarding cybersecurity threats, awareness is the most important aspect.
Otherwise, unsuspecting users would be more likely to fall prey to any kind of
scam, data theft, breach, or another threat. This goes hand in hand with
vigilance, which is especially important for people using their company-issued
devices also for private purposes, as even a small mistake based on human error
could end costing the company up dearly.

With that in mind, it’s better to be safe than sorry and take these precautions:

 1. As per the FBI, avoid using public USB charging spots. They can be used to
    compromise your devices, so opt to have your own outlet charger or an
    external power bank with you instead.
 2. Within your phone settings, try to disallow data transfers while charging.
    This setting is usually the default; however, it still is better to check
    and stay safe than sorry.
 3. Use “USB Condoms.” Yes, just like the name insinuates, these low-cost
    “condoms” connect to your USB port/cable and offer additional protection by
    severing any data transfer between a device and the charging point.
 4. Lastly, DO NOT use USB cables/power banks/flash drives or anything that
    connects to your device that is NOT yours or that you just found lying on
    the street or on a table.

With these points in mind, you can be sure that you are one step ahead of
potential security issues related to charging, but if you still harbor some
doubts, feel free to check out some of our other articles on WeLiveSecurity or
the ESET Blog for additional tips and best practices.


Márk Szabó
28 Jun 2023 - 11:30AM


SIGN UP TO RECEIVE AN EMAIL UPDATE WHENEVER A NEW ARTICLE IS PUBLISHED IN OUR
UKRAINE CRISIS – DIGITAL SECURITY RESOURCE CENTER

Submit


NEWSLETTER

Submit


SIMILAR ARTICLES

Digital Security

PASSWORDS OUT, PASSKEYS IN: ARE YOU READY TO MAKE THE SWITCH?

Digital Security

CYBER INSURANCE: WHAT IS IT AND DOES MY COMPANY NEED IT?

Digital Security

DIGITAL SECURITY FOR THE SELF-EMPLOYED: STAYING SAFE WITHOUT AN IT TEAM TO HELP

Digital Security

TOP 5 SEARCH ENGINES FOR INTERNET-CONNECTED DEVICES AND SERVICES


DISCUSSION


 * Home
 * About Us
 * Contact Us

 * Sitemap
 * Our Experts
 * ESET

 * Research
 * How To
 * Categories

 * RSS Configurator

Privacy policy Legal information Manage cookies
Copyright © ESET, All Rights Reserved
Back to top

Your account, your cookies choice
We and our partners use cookies to give you the best optimized online
experience, analyze our website traffic, and serve you with personalized ads.
You can agree to the collection of all cookies by clicking "Accept all and
close" or adjust your cookie settings by clicking "Manage cookies". You also
have the right to withdraw your consent to cookies anytime. For more
information, please see our Cookie Policy.
Accept all and close
Manage cookies
Essential cookies
These first-party cookies are necessary for the functioning and security of our
website and the services you require. They are usually set in response to your
actions to enable the use of certain functionality, such as remembering your
cookie preferences, logging in, or holding items in your cart. You can´t opt out
of these cookies, and blocking them via a browser may affect site functionality.
Basic Analytical Cookies
These first-party cookies enable us to measure the number of visitors/users of
our website and create aggregated usage and performance statistics with the help
of our trusted partners. We use them to get the basic insight into our website
traffic and our campaign performance and to solve bugs on our website.
Advanced Analytical Cookies
These first or third-party cookies help us understand how you interact with our
website and each offered service by enriching our datasets with data from
third-party tools. We use these cookies to improve our website, services, and
user experience, find and solve bugs or other problems with them, and evaluate
our campaigns´ effectiveness.
Marketing cookies
These third-party cookies allow our marketing partners to track some of your
activities on our website (for example, when you download or buy our product) to
learn about your interests and needs and to show you more relevant targeted ads.
Accept and close
Back