This article will help you understand the way how hackers steal your data with the help of charging points available in Public areas.
The biggest bank of nation-State bank of India recently tweeted and aware people to be alert when they plug-in charging sockets to charge their cell phones at public places like bus stands, shopping centers, railway stations, and etcetera. SBI claimed and alert that fraudsters may take secret information that includes emails, wallet photos, contacts, net banking or social website password. To commit such a crime fraudster to make use of Malware White software.
Ever wondered how it is done?
You will wonder how our personal data can be stolen through just a charging point. When people charge their phones at public spots, hackers export your personal data by using Malware and Fishing tricks. To export your files they use a data card known as ‘Auto Data Transfer device’ which is available at a website Alibaba.com for 300-400 dollars.
To carry out this process hackers attach ‘Auto Data Transfer device’ just behind the charging port at public stations, when people put their USB cable in charging port then their mobile screen gets a pop-up message which users often ignore and click on the allow button without reading the description written in the dialog box and which results in the exportation of their confidential information into the ‘Auto Data Transfer device’.
In this way, hackers get the allowance to have your personal data into their memory device
When we charge our phones at home or business place we don’t get any pop-up messages on our phone screen. So if you get the same message which asks you to click on allow button, we recommend you to read the whole information written in the dialog box if the written information seems to be suspicious please don’t click on the allow button otherwise you will be tricked to hack your whole mobile phone data
Explorers ought to abstain from utilizing open USB control charging stations in air terminals, hotels, and different areas since they may contain risky malware. In the USB charger trick, regularly called ‘juice jacking’, lawbreakers load malware onto charging stations or links they leave connected at the station so they may contaminate the cell phones and other electrical gadgets of clueless clients.
The malware may bolt the gadget or export information and passwords legitimately to the scammer.
The Official SBI tweet
SBI informed its followers and customers by tweeting on twitter that thinks twice before you plug in your phone at charging stations. Malware could find a way in and infect your phone, giving hackers a way to steal your passwords and export your data.
Over-whelming result of an International experiment
An international organization at the RSA security gathering in San Francisco, Authentic8 set up a charging station at its booth, offering cords for individuals to charge their gadgets.
The organization ran a casual social examination to perceive what number of individuals would utilize general society charging stations. Paik said a mind-boggling number of participants – about 80% – connected their phones without getting some information about the security.
The result showed that a maximum number of travelers at airports, bus stands or railway stations don’t even know the risks behind using phone charging booths as hackers target such places to hack or export the personal data of people into their ‘Auto Data Transfer device’.
Charging booths at Connaught place Delhi
Our team made a visit to the most popular shopping market which is visited by thousands of people every day. This market has a couple of phone charging booths and Wi-Fi zone at different distances which are often used by the people having low phone batteries. Without knowing the dangerous effects of plugging in people keep on charging their phones.
The hackers could record and mirror the screen of a device that is plugged in for a charge. The technique became known as “video jacking.” In this attack, called video jacking, what looks like a USB port is actually equipped to pull HDMI video from devices; allowing hackers to copy everything you do on the screen, such as enter passwords. This kind of attack has been shown to work but has never been seen in the wild.
Rescue yourself from being trapped
⦁ Rather than charging your cell phones at public places, put resources into a convenient USB battery pack from known vendors
⦁ You can also purchase USB cords that are explicitly implied for charging and can’t move your phone’s information. The most ideal approach to abstain from succumbing to juice jacking is to not utilize open USB ports yet rather, depend on your own home charger.
⦁ Wireless charging compatible phones are good enough to keep us safe as we don’t have the need to connect our phones directly with charging ports.
⦁ “The only defense is a very simple rule: Don’t plug your phone into a charger you don’t own.”
⦁ Look for an electrical socket behind the charging station rather than plugging the USB cable directly in suspicious Charging slots at public places