×
ChoiceJacking Attack Lets Malicious Chargers Steal Data

“ChoiceJacking” Attack Lets Malicious Chargers Steal Data

ChoiceJacking is an advanced attack to bypass long-standing USB security measures and can extract sensitive data like photos, documents, and app files often without any user interaction. This silent data theft is perpetrated in seemingly harmless charging stations.

It has now become a major evolution of the infamous “juice jacking” threat which is being prevented by security prompts for USB data, warning users when a connection could transfer data, not just charge.

However, ChoiceJacking breaks through those protections, exploiting flaws in how mobile operating systems handle USB interactions. It allows a malicious charging station to act autonomously  tricking the device into giving up access without any user consent or visible sign of intrusion.

Real-World Threat at Public Charging Stations

The most likely place to encounter ChoiceJacking? Public charging stations such as the ones found at airports, cafes, hotels, and transport hubs. These are often used when people are distracted and less likely to notice on-screen prompts, making them ideal attack vectors. Tech giants are now moving quickly to mitigate the threat.

How to Protect Yourself

Security professionals are urging users to avoid public USB ports and instead:

  • Use personal wall adapters or portable battery packs.
  • Keep all devices updated with the latest security patches.
  • Invest in USB data blockers which are simple devices that allow charging without enabling data transfer.

This discovery is a wake-up call. Even with modern security prompts, sophisticated attackers can still find ways in. As mobile threats evolve, so must our defenses. Learn more on how to protect yourself with our Security Awareness Training.

 

×

Cybersecurity Made Affordable!