Home » Cybersecurity/Digital Solutions » Juice Jacking: How Hackers Use Public Charging Ports to Gain Access to Your Device
While on the road, truck drivers have to find ways to charge their mobile devices, tablets and computers, just like the rest of the world. And while we try to avoid hacker threats every day, one might think the simple act of recharging a battery in a public setting would present little concern.
But one might be wrong.
The Federal Bureau of Investigation (FBI) is again warning travelers of a significant threat from using public USB charging ports. Most people who spend time in public have seen these ports in locations like hotels, airports, and stadiums. They present themselves as convenient and sometimes a lifesaver when a traveler’s battery is about to die.
But the FBI says criminals have found ways to compromise these public ports. Using the USB connection, they gain unauthorized access to phones, tablets, or computers—or even infect them with malware. As little as one minute could be enough to give hackers access to your personal or business information.
This type of hack is known as “juice jacking,” because while you’re connecting to get more battery power (or juice) criminals are hijacking your device.
Consider the potential threat to an LTL trucking company if a driver’s device connects to the company’s operational software. Malware attacks cost trucking companies substantial sums of money if they have to pay a ransom, and it’s astonishing to think an attack could start from using a public USB charging port.
Juice jacking is so common and widespread that the FBI has issued a warning for people to avoid using public charging ports. But the FBI is very serious in warning that it can. So serious, in fact, that it’s urging people to avoid the use of these charging ports.
While juice jacking may sound new to you, it has been a trend among hackers for years. In response, the FBI has issued warnings since 2011, however despite sounding the alarm bells, the threat has become increasingly more severe.
So, what can truck drivers and others who spend extensive time traveling on the road do to safely charge their devices? Here are 6 tips to protect your data while traveling:
But what if you’re in public and followed all the protocols to stay safe, and your device still dies? What then? If you are in a bind and you have no other choice than to use a public charging portal, try these 6 sensible steps to help protect your device from juice jacking:
A trucking company can spend big money on cybersecurity measures in-house and still get attacked by juice jacking. By understanding the known risks of using public USB charging ports, companies can take steps to educate their drivers on how to avoid a nasty cyber attack.
If you have any questions, feel free to e-mail me at antwan.banks@nmfta.org.
Antwan D. Banks just recently joined NMFTA as its director of enterprise security. Banks, a veteran of Operation Desert Storm, most recently served as director of cybersecurity for the Metropolitan Atlanta Rapid Transit Authority. In the nine years he served in that position, Banks ensured that the authority would be well-protected by focusing on security tools, training, budgeting, strategic and tactical directions, intelligence programs, incident response and many other crucial priorities. Prior to his tenure with the Transit Authority, Banks served as senior security engineer for Turner Broadcasting System, and was also a computer security consultant for the U.S. Department of Health and Human Services and Centers for Disease Control.