Cell phones are vulnerable to spies at public charging points, FBI warns

Telemóveis estão vulneráveis a espiões em pontos públicos de carregamento, alerta o FBI

The FBI has identified spyware malware in mobile device charging points with USB ports or inputs capable of siphoning data, which could compromise the security of cell phones and tablets.

According to the FBI, it would be wise to avoid charging devices via USB in airports, hotels, commercial spaces or even outdoors.

The US agency indicates that hackers have managed to find a way to turn these charging ports into a means of transferring malicious software to the devices that connect to them. This malware can be used to monitor the affected devices remotely, or transfer personal information and access passwords to third parties.

If you need to use a public charging point, it is preferable to use an electrical outlet, which means you should bring an adapter with you, as well as a USB cable. The Federal Communications Commission, also in the United States, has published a note on the same subject, in which it also recommends preferring public electrical sockets over USB ports.

The FCC has recommended that anyone who is about to use a USB cable in public places should do so with a cable that only allows the device to be charged, thus protecting the inadvertent transfer of data to third parties. You should also always use your own USB cable. Even better is to travel with an extra battery or portable charger.

The two US organizations identify the technique of entering equipment to install malware via USB charging stations as "juice jacking".

Share this article

Leave a Reply

Your email address will not be published.