When your mobile phone or laptop’s battery is down to its last drop, a public charging station would seem like an oasis in the desert. It provides a convenient way to boost your device’s battery on the go. However, IT support company cautions about this. What may be a blessing for the device owner can actually be the port for which evildoers are using to get hold of your data.

In a tweet released by the FBI, the agency warns the public against using public charging points. Threat actors are now using these innocent devices to get hold of your data or install malware. This is what they call “juice jacking”.

IT Support Company Warns About Hidden Danger Behind Public Chargers

IT Support Company Warns About Hidden Danger Behind Public Chargers

How does it happen?

You may have tried charging your phone by connecting a cable to your computer port, right. Usually when you do that, the laptop or the phone would ask you if you would like to charge or transfer data between the two devices. The case is the same when it comes to juice jacking. IT support company explains that these threat actors are accessing the data on your phone or laptop while it is charging. The difference, however, is that they do so without your knowledge and, much less, consent.

These forms of attacks do not even need sophisticated hacking skills. Low-level hackers can easily perform this mayhem as the tech needed is small, cheap and easily accessible. 

IT Support Company Shares Possible Damage that Can be Expected 

Data collection 

Cybercriminals can opt to get your personal and financial information by cloning or copy your phone data. They can use this to either cause you direct and personal attacks such as identity theft and stealing from your bank and credit accounts. Similarly, data they collect from your device can also be sold to a third-party. 

Install malware 

Malware infects your device to carry out various tasks. This includes spyware, ransomware, crypto miner and a whole lot more. Device owners usually would not be able to detect the infection until it is too late. 

Portal to other devices 

Cyber criminals can also use your device as a way to connect to other devices. They can use your phone or laptop to get through cloud servers as well as other networks you are connected to.  

Similarly, they can use your device to spread viruses or malware and infect other devices. On the same note, it can also be made to infect and create new juice jacking charging points once you connect to a non-infected public charger.  

Protect your devices, IT support company

The best way to avoid being a victim of this kind of attack is simply to avoid public charging stations. IT support company suggests bringing your own chargers anytime and anywhere that you can connect to a power outlet. You can also make use of external batteries for this purpose.  

If charges are too big, bulky or cumbersome for you, you may also want to invest in a data blocker. As the name implies, this device prevents data transfer but still allows charging.

If you are worried about your device threatening your business data and customer information, talk to us! We can help your business stay secure and still be productive at the same time.  

Call us now and get started!

IT support company

 

Watch Our Latest Tech Videos From EB Solution

Call Now