“JuiceJacking” is the name given to this type of attack. It consists of tampering with a public charging station to extract information from unsuspecting users. To date, there is no public data showing the magnitude of this type of attacks, but the FBI has already explicitly asked the public to stop using these types of chargers.

Even the name itself “extracting juice” gives clues about how it works. Let's suppose a person who is traveling needs to charge their phone. Today, the cables are USB, capable of carrying both power and data. The trick is that regular home chargers only carry current, but with public chargers, it is not very clear what is on the other end of the cable.

Esto abre la posibilidad de que en el otro extremo exista un ordenador infectado y que se haya reprogramado para inyectar malware. La recomendación es utilizar enchufes convencionales y un cargador certificado y conocido.

Fountain: Segu-Info | Naked Security


Leave a Reply

Your email address will not be published. Required fields are marked *

More news
La franquicia de gimnasios Basic-Fit sufre una exfiltración de datos
Read more »
New wave of scams using AI-cloned voices
Read more »
Una brecha en la Comisión Europea salpica unas treinta instituciones
Read more »
Un ciberataque expone datos y entradas de aficionados del FC Ajax
Read more »
Michelin suffers a data exfiltration
Read more »