CYBER NEWS

Juice Jacking Malware Charging Attacks May Lead To Serious Infections

Juice jacking is the practice of abusing publicly available USB charging ports to insert malware onto the introduced smart devices.




It appears that this malicious technique can allow the hackers to deliver a wide range of dangerous malware. The end goal is to hijack the devices with them.

Juice Jacking Becoming More Popular Among Computer Hackers

Juice Jacking is a dangerous technique which allows computer hackers to infect devices en-masse. This is done by manipulating publicly available USB chargers. This is possible by manipulating the hardware of the cables or the chipsets that are inside the chargers by inserting malicious code. Most of the publicly available chargers are relatively easy to hack into and experienced hackers can make them look as if nothing happened.

The most popular targets are smartphone users using the two most popular operating systems — Android and iOS. The reason for this is that this segment of devices are usually the ones that are charged the most out in public. This will prompt the hackers into creating virus code that is specifically for them. The Juice Jacking malware infection technique can be used in two distinct ways:

  1. Data Theft — While the device is charging the malicious scripts will access the file system and steal whatever files they can retrieve.
  2. Malware Installation — By acquiring access to the memory of the smart devices the infected chargers can easily implant all kinds of viruses.
Related:
A team of security researchers reported the discovery of a new technique used to install cryptocurrency miners called Process Hollowing
Process Hollowing Technique Used to Install Cryptocurrency Miners

Small-sized scripts and payload delivery modules do not require access to the full file system. Many of them can deliver other threats. Good examples are cryptocurrency miners which are small-sized engines that are programmed to download a sequence of complex mathematical tasks that will take advantage of the available hardware resources: CPU, memory, GPU and hard disk space. They will be downloaded in sequence and as soon as one of them is completed and reported to the hackers a certain fee will be paid out to the criminals directly to their digital wallets.

The other popular malware type which is commonly installed in such scenarios is the Trojan client. There are many different iterations that the hackers can use — most of the Trojans nowadays are very portable (small in size) and will download any additional modules on request. Their main task is to establish a secure connection to a hacker server that will allow the hackers to spy on the victims, take over control of their systems and carry out additional crimes.

Avatar

Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

More Posts - Website

Follow Me:
TwitterGoogle Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...