Real World Risk Management Practical HR Resources
welcome
Are you a new user?
REGISTER HERE





RETRIEVE PASSWORD

"Juice Jacking" Alert: FBI Warns Of Bad Public Charging Ports

The FBI has advised the public to avoid using public USB charging ports in places like airports and shopping centers. The warning follows reports of "bad actors" utilizing often-used public USB ports as an entry point for loading malware and spyware onto connected electronic devices.

The Bureau urged the public to carry their own chargers and USB cords and to utilize electrical outlets to charge their devices and not USB charging ports.

Cybersecurity experts have previously cautioned about the dangers of criminals loading malware onto public charging stations to gain unauthorized access to devices. https://ca.movies.yahoo.com/movies/fbi-warns-against-using-public-170616785.html (Mar. 07, 2024).

Commentary

As noted in the above source, the FBI has flagged an increase in internet scams that has led to Americans losing $10.3B. "Juice jacking" is just one of the many crimes that has led to the billions lost.

Juice jacking involves modifying public USB charging stations with hardware or software that can install malware on devices once a user is connected.

Basically, a criminal accesses the charging station (how this is done without being spotted is a logical question) and integrates malicious software or hardware. This means the criminal actually opens the station and inserts a device that intercepts and/or modifies USB data lines or remotely installs malware if the station is part of a connected system accessible via the Internet.

When an unsuspecting user plugs a device in to charge the software, the malware activates. Because USB cables carry power and data, the malware can be transmitted alongside the electricity.

The malware is then installed and can be done so without consent of the user. Most operating software assumes USB connections are safe so no consent is required - zero warning or even hint of risk.

Once in, criminals can then execute a variety of malicious functions. This could include stealing personal data such as passwords, banking information, contacts, and emails, or installing further malicious applications or hijack the device for other purposes.

The good news is the fix is simple.

Do not use public USB charging ports. Instead use electrical outlets (which do not carry data) or charge your device using your own portable battery instead of a public port.  If that doesn't work for you, consider purchasing USB cables that only conduct power and do not transmit or accept data.

 

Finally, your opinion is important to us. Please complete the opinion survey:

"Search and Destroy" Malware Rises: What Best Practices Can Help Protect Organizations?

Malware that turns off network security software has increased 26 percent from last year in response to better cyber defenses. We examine the importance of training.

read more

Training Required For Password Best Practices

Not all employees follow cybersecurity best practices, which can put organizations at risk of a cyberattack. We examine passwords and the need for training.

read more

Recent Data Breach Increases Risk Of A Convincing Social Engineering Scam

Cybercriminals claim to have stolen the personal financial data of more than half a billion Ticketmaster customers. Learn about the risk.

read more

Colorado Regulates AI-Consumer Interactions: How Will This Impact Employers?

As artificial intelligence plays a larger role in everyday life, states are stepping in to regulate.

read more