ResearchSpace

The threat of juice jacking

Show simple item record

dc.contributor.author Veerasamy, Namosha
dc.date.accessioned 2022-07-22T10:14:00Z
dc.date.available 2022-07-22T10:14:00Z
dc.date.issued 2021-06
dc.identifier.citation Veerasamy, N. 2021. The threat of juice jacking. http://hdl.handle.net/10204/12460 . en_ZA
dc.identifier.isbn 978-1-912764-99-0
dc.identifier.isbn 978-1-912764-43-3
dc.identifier.issn DOI:10.34190/EWS.21.023
dc.identifier.uri http://hdl.handle.net/10204/12460
dc.description.abstract Cyber attacks can affect the confidentiality, integrity and availability of data/ systems. Some attacks aim to steal data whereas others try cause destruction. One such vulnerability stems from the malicious use of USB chargers. When travelling and our smartphone battery level is very low, users may find a nearby charging station. However, users need to think twice before simply plugging in their device. What seems like an innocent charge could turn into a golden opportunity for attackers. Malware could actually be introduced into smartphones and other devices through the USB charger. Juice jacking is emerging as a potential risk as cyber criminals aim to infect users and potentially steal their passwords and infiltrate bank accounts. Users could even get locked out of their devices. This paper takes a closer look at this developing threat. These public charging stations are now being fraudulently used by attackers to gain access to sensitive information. Scammers are now using USB chargers as a method to steal data or install malware. However, users may be unaware of the potential risk. In this research, the malicious use of USB charging stations found in spots popular with travellers are revealed. In addition, protective measures are described in order to help users from falling victim to this latest cyber threat. Attackers try to take advantage of the situation in that most users trust their mobile devices more than their desktop devices. In addition to data theft, malicious attackers could also cause destruction of our mobile devices. When fast charging, malware could be installed onto a mobile device overwriting its firmware and arming it as a weapon. The firmware could be overwritten and the phone overloaded. The charger is thus compromised and used to overload a device. These various attack vectors are discussed in the paper to show the danger of juice jacking. en_US
dc.format Fulltext en_US
dc.language.iso en en_US
dc.relation.uri https://www.proquest.com/openview/f4c4b8d95a33ace03499a1fc858bdcb0/1 en_US
dc.relation.uri https://books.google.co.za/books?id=wCo4EAAAQBAJ&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false en_US
dc.source Proceedings of the 20th European Conference on Cyber Warfare and Security (ECCWS 2021), University of Chester, United Kingdom, 24-25 June 2021 en_US
dc.subject Charge station en_US
dc.subject Juice jacking en_US
dc.subject USB charger en_US
dc.subject Cyber warfare en_US
dc.subject Cyber security en_US
dc.subject Cyber attacks en_US
dc.title The threat of juice jacking en_US
dc.type Conference Presentation en_US
dc.description.pages 6 en_US
dc.description.note Paper delivered at the 20th European Conference on Cyber Warfare and Security (ECCWS 2021), University of Chester, United Kingdom, 24-25 June 2021 en_US
dc.description.cluster Defence and Security en_US
dc.description.impactarea Information & Cyber Security C en_US
dc.identifier.apacitation Veerasamy, N. (2021). The threat of juice jacking. http://hdl.handle.net/10204/12460 en_ZA
dc.identifier.chicagocitation Veerasamy, Namosha. "The threat of juice jacking." <i>Proceedings of the 20th European Conference on Cyber Warfare and Security (ECCWS 2021), University of Chester, United Kingdom, 24-25 June 2021</i> (2021): http://hdl.handle.net/10204/12460 en_ZA
dc.identifier.vancouvercitation Veerasamy N, The threat of juice jacking; 2021. http://hdl.handle.net/10204/12460 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Veerasamy, Namosha AB - Cyber attacks can affect the confidentiality, integrity and availability of data/ systems. Some attacks aim to steal data whereas others try cause destruction. One such vulnerability stems from the malicious use of USB chargers. When travelling and our smartphone battery level is very low, users may find a nearby charging station. However, users need to think twice before simply plugging in their device. What seems like an innocent charge could turn into a golden opportunity for attackers. Malware could actually be introduced into smartphones and other devices through the USB charger. Juice jacking is emerging as a potential risk as cyber criminals aim to infect users and potentially steal their passwords and infiltrate bank accounts. Users could even get locked out of their devices. This paper takes a closer look at this developing threat. These public charging stations are now being fraudulently used by attackers to gain access to sensitive information. Scammers are now using USB chargers as a method to steal data or install malware. However, users may be unaware of the potential risk. In this research, the malicious use of USB charging stations found in spots popular with travellers are revealed. In addition, protective measures are described in order to help users from falling victim to this latest cyber threat. Attackers try to take advantage of the situation in that most users trust their mobile devices more than their desktop devices. In addition to data theft, malicious attackers could also cause destruction of our mobile devices. When fast charging, malware could be installed onto a mobile device overwriting its firmware and arming it as a weapon. The firmware could be overwritten and the phone overloaded. The charger is thus compromised and used to overload a device. These various attack vectors are discussed in the paper to show the danger of juice jacking. DA - 2021-06 DB - ResearchSpace DP - CSIR J1 - Proceedings of the 20th European Conference on Cyber Warfare and Security (ECCWS 2021), University of Chester, United Kingdom, 24-25 June 2021 KW - Charge station KW - Juice jacking KW - USB charger KW - Cyber warfare KW - Cyber security KW - Cyber attacks LK - https://researchspace.csir.co.za PY - 2021 SM - 978-1-912764-99-0 SM - 978-1-912764-43-3 SM - DOI:10.34190/EWS.21.023 T1 - The threat of juice jacking TI - The threat of juice jacking UR - http://hdl.handle.net/10204/12460 ER - en_ZA
dc.identifier.worklist 25560 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record