BOOK AN APPOINTMENT WITH AN IT SPECIALIST TODAY

Juice Jacking: The Next Cyberattack

Juice Jacking is another creative way that cyber attackers are accessing your data. Learn more about the concept and how to prevent it.  

Business Email Compromise

The public must be on guard for any cyberattack that comes their way; however, attackers are creative and are constantly innovating towards the next type of cyber-attack to catch unsuspecting people. Most recently, the concept of “Juice Jacking” has made its way into public attention.

Juice Jacking is a type of attack that uses a charging port, infected cable, or portable battery to access available data on a connected device such as a smartphone or a laptop. Once a device has been infected, attackers can export your data, steal passwords and other personal information, or lock your device entirely making it unusable.

How Juice Jacking works

A conventional USB cable is not only useful for charging your device, but its primary use is to transfer information from one device to another. As soon as a device is connected to a USB outlet, this allows attackers access to devices.

We have all heard of identity thieves putting on card-reading devices, skimmers, or camera on ATMs and other card readers such as at a gas station pump, but attackers are also able to change out USB hardware for another USB port that allows them access to any who connect to the port. Typically, we see threats to our devices in public such as hotels, public kiosks, and airports.

Juice Jacking and Travel

For those people who travel regularly, they rely on the public charging kiosks to keep them connected to family, loved ones, and work while out and about. But USB public charging stations are a prime target for those people seeking to steal and use your personal information.

Attackers can use not only a public kiosk as a way to gain access to your devices, but they can also use an infected cable. Beware to not use cables that are found already plugged into charging stations or you could already have one in your possession as a free gift. It is very easy to mask a cable to look like a brand name item, and most people believe that cables are not capable of holding information maliciously.

Another method to get victims to connect to a power source is to infect portable batteries, and with the rise of shared or rented portable batteries that you can purchase in airports, it has become easier for attackers to gain their victim’s data and move on to the next airport, making pinpointing the problem harder for those trying to stop the attacks.

Preventing Juice Jacking

The easiest way to prevent Juice Jacking is to plug your devices in via your power adapter that normally comes with your device. Another option is to carry your own power bank. A personal power bank can hold enough power for several recharges. Finally, a product that has been developed to combat the threat of Juice Jacking is a USB data blocker, a small adapter that you attach to the end of the USB cable you would like to use that prevents the transfer of data.

More Like This

How Microsoft Dataverse Helps Your Organization Store and Manage App Data Securely

How Microsoft Dataverse Helps Your Organization Store and Manage App Data Securely Microsoft Dataverse is a software as a service (SaaS) solution capable of resolving wide-ranging data management and businesses’ storage issues. As an ever-increasing number of organizations generate a large amount of data, there is a need to manage it securely and efficiently. Thus, …

How Microsoft Dataverse Helps Your Organization Store and Manage App Data Securely Read More »

Read More

AA21-055A: Exploitation of Accellion File Transfer Appliance

Original release date: February 24, 2021 Summary This joint advisory is the result of a collaborative effort by the cybersecurity authorities of Australia,[1] New Zealand,[2] Singapore,[3] the United Kingdom,[4] and the United States.[5][6] These authorities are aware of cyber actors exploiting vulnerabilities in Accellion File Transfer Appliance (FTA).[7] This activity has impacted organizations globally, including …

AA21-055A: Exploitation of Accellion File Transfer Appliance Read More »

Read More

AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware

Original release date: February 17, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This joint advisory is the result of analytic efforts among the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency …

AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware Read More »

Read More

How IT Consulting Companies Can Help Overcome Technology Challenges

How IT Consulting Companies Can Help Overcome Technology Challenges Information technology helps businesses of varying sizes to enhance operations and thrive. To maximize the benefits of technology, businesses often enlist the help of established IT consulting companies. With the assistance of highly skilled consultants, organizations empower themselves with the right tools to bolster innovation and overcome …

How IT Consulting Companies Can Help Overcome Technology Challenges Read More »

Read More

AA21-042A: Compromise of U.S. Water Treatment Facility

Original release date: February 11, 2021 Summary On February 5, 2021, unidentified cyber actors obtained unauthorized access to the supervisory control and data acquisition (SCADA) system at a U.S. drinking water treatment plant. The unidentified actors used the SCADA system’s software to increase the amount of sodium hydroxide, also known as lye, a caustic chemical, …

AA21-042A: Compromise of U.S. Water Treatment Facility Read More »

Read More

Pros and Cons Of Outsourcing Your IT Support To A Managed Services Provider

Pros and Cons Of Outsourcing Your IT Support To A Managed Services Provider Paper or plastic? Cash or charge? MSP or in-house IT? There are many choices that you need to make on a daily basis, some personal and some related to keeping your business running. However, the last question can have a serious impact …

Pros and Cons Of Outsourcing Your IT Support To A Managed Services Provider Read More »

Read More