What is “juice jacking”?
Juice jacking is a cyber attack in which a compromised Universal Serial Bus (USB) charging station transfers malware to, or steals personal information from, a connected device. Juice jacking, also known as port jacking, is not limited to cell phones but any device capable of being charged via USB plug.
USB plugs are designed for two-way transfer of data. When a USB cable is connected between an electronic device and a charging station, there is a trusted relationship established. The connected device is receiving a charge while the charging station has access to the device’s entire database, including sensitive data. Unless the charging station was compromised, charging stations are not concerned with what is on a person’s device.
How do I know if I’m a victim of juice jacking?
Victims are often unaware that they have been "juice jacked", but there are some telltale signs that a device may be compromised. The device may:
How can I protect myself?
On many new devices, automatic two-way transfer of data is disabled. But if you really need to charge a device on the go, take some precautions:
The bottom line: Be cautious where you charge your electronic device. Public charging stations at airports, hotels and restaurants are a prime target for cybercriminals to juice jack and collect your information or install malware to further criminal activity.
Army Cyber on U.S. Army website
1st IO Command
780th MI Brigade (Cyber)
Department of Defense
U.S. Cyber Command
Air Forces Cyber
U.S. Fleet Cyber
Marine Corps Forces Cyber
Coast Guard Cyber
U.S. Army Reserve
Army National Guard
U.S. Army Cyber Center of Excellence
Developing tomorrow’s cyberspace strategies today.
Army Cyber School
Army Cyber Institute
National Defense University College of Information and Cyberspace
Air Force Institute of Technology
Defense Cyber Investigations Training Academy
Hacking for Defense
Defense Advanced Research Projects Agency
Defense Digital Service