ETFOptimize | High-performance ETF-based Investment Strategies

Quantitative strategies, Wall Street-caliber research, and insightful market analysis since 1998.


ETFOptimize | HOME
Close Window

Juice Jacking Cybersecurity Attack Solution for Consumers & Businesses

Businesses and the general public are now very wary of charging mobile devices in public venues. The Federal Bureau of Investigation (FBI) and the Federal Communications Commission (FCC) just updated their guidance on the risks of using public USB charging stations to recharge mobile devices.

The concern is a cyber-theft tactic called “juice jacking.” Juice jacking is the exploitation of a device using a modified USB cable (dirty USB cable) and/or malware to compromise a device while it is charging. Since USB and Apple Lightning cables contain both power and data connections in the same cable and connector, the exploit leverages the data connections as the device attempts to synchronize data.

An Overview Of Juice Jacking

The attack itself is a hardware man-in-the-middle attack (MitM). It uses the physical connection to compromise the device using malicious software that can extract information such as passwords, contact information, emails, etc. or install malware on the device even if it is not unlocked or jailbroken.

Threat actors (or as the FCC refers to them as “bad actors”) can then use that information to compromise online accounts or harvest the information from multiple victims for sale on the dark web. In at least a few cases, the malware has attempted to entice victims with a free promotional gift, according to The New York Times.

Juice jacking is not a new attack vector. In fact, it was first disclosed in August 2011 and demonstrated at a hacking conference called DefCon, where attendees were offered free charging stations to demonstrate the attack vector. Since then, a variety of new methods have been discovered to create dirty cables and leverage exploits to enable the compromise of a charging device.

Business Implications Of Juice Jacking

While some reading this article may consider the risk to be isolated to consumers, there are real-world business impacts to employees that might be traveling for work or pleasure.

Consider the average employee that does not travel frequently for work in contrast to a hardened road warrior who typically carries a dedicated bag of cables and adapters for charging and connectivity. The infrequent business traveler may forget to pack a charging adapter in their carry-on luggage, forget to pack one for all their device types (USB C, Apple Lightning, MagSafe or proprietary) or not have an international power adapter depending on their destination.

Their only recourse is to use a public charging station in order not to be electronically stranded. If they do use one, then they and the organization face risks of malware that could compromise their mobile devices, potentially with sensitive business information, or a multifactor authentication attack.

Juice Jacking Solution for Consumers & Businesses

Now with QimaXx new wireless charging solution Qi-Wallet, consumers and business travelers do not have to be a victim of this latest cyber threat and can now use any public USB charging stations anywhere they like to charge their devices.

At Kickstarter; Coming soon:

https://www.kickstarter.com/projects/1248189437/worlds-1st-magsafe-wallet-and-wireless-charger-fusion?ref=discovery

Media Contact
Company Name: III Hong Kong Limited
Contact Person: Qi-wallet by QimaXx
Email: Send Email
Country: United States
Website: https://www.kickstarter.com/projects/1248189437/worlds-1st-magsafe-wallet-and-wireless-charger-fusion?ref=discovery


Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.


 

IntelligentValue Home
Close Window

DISCLAIMER

All content herein is issued solely for informational purposes and is not to be construed as an offer to sell or the solicitation of an offer to buy, nor should it be interpreted as a recommendation to buy, hold or sell (short or otherwise) any security.  All opinions, analyses, and information included herein are based on sources believed to be reliable, but no representation or warranty of any kind, expressed or implied, is made including but not limited to any representation or warranty concerning accuracy, completeness, correctness, timeliness or appropriateness. We undertake no obligation to update such opinions, analysis or information. You should independently verify all information contained on this website. Some information is based on analysis of past performance or hypothetical performance results, which have inherent limitations. We make no representation that any particular equity or strategy will or is likely to achieve profits or losses similar to those shown. Shareholders, employees, writers, contractors, and affiliates associated with ETFOptimize.com may have ownership positions in the securities that are mentioned. If you are not sure if ETFs, algorithmic investing, or a particular investment is right for you, you are urged to consult with a Registered Investment Advisor (RIA). Neither this website nor anyone associated with producing its content are Registered Investment Advisors, and no attempt is made herein to substitute for personalized, professional investment advice. Neither ETFOptimize.com, Global Alpha Investments, Inc., nor its employees, service providers, associates, or affiliates are responsible for any investment losses you may incur as a result of using the information provided herein. Remember that past investment returns may not be indicative of future returns.

Copyright © 1998-2017 ETFOptimize.com, a publication of Optimized Investments, Inc. All rights reserved.