From CISO Marketplace — the hub for security professionals Visit

Juice Jacking

Data Protection

Definition

Malicious USB charging ports that install malware or steal data from connected devices.

Technical Details

Juice Jacking occurs when a public USB charging station, such as those found in airports, cafes, or hotels, is compromised by cybercriminals to deliver malicious software to devices through the USB connection. When a device is plugged in, the data lines within the USB cable can be used to transfer malware or extract sensitive information from the device. This process exploits the dual purpose of USB connections, which can provide both power and data transfer capabilities. Attackers can modify charging stations or cables to facilitate unauthorized data access, leading to potential identity theft, loss of personal information, or installation of spyware.

Practical Usage

Juice Jacking highlights the risks associated with using public charging stations. Users are often unaware that these ports can be manipulated to install malware or siphon off data. To mitigate these risks, individuals should use their own charging cables with power-only adapters, such as USB data blockers, or rely on portable battery packs. Organizations can educate users about the dangers of public charging stations and encourage them to avoid using these facilities when possible.

Examples

Related Terms

Malware USB Security Public Wi-Fi Risks Data Theft Phishing
← Back to Glossary