The TSA Warns Against 'Juice Jacking' at the Airport—Here's How to Protect Yourself
The TSA Warns Against 'Juice Jacking' at the Airport—Here's How to Protect Yourself

The TSA Warns Against ‘Juice Jacking’ at the Airport—Here’s How to Protect Yourself

How did your country report this? Share your view in the comments.

Diverging Reports Breakdown

The TSA Warns Against ‘Juice Jacking’ at the Airport—Here’s How to Protect Yourself

The Transportation Security Administration recently warned travelers against the dangers of ‘juice jacking’ It’s a cyberattack where criminals install malware on public charging stations to steal data from connected devices. Digital forensics expert Calum Baird says he hasn’t encountered any actual cases in his professional experience. Danny Jenkins, cofounder and CEO of ThreatLocker, points to an unexpected source: deceptive USB-C cables, which pose a greater risk to travelers. The FCC is not aware of any confirmed cases of juice jacking, but it’s always a good idea to take extra precautions, just in case.”If it’s asking you to trust a device you’ve connected to, decline,” Jenkins says. “It doesn’t need data transfer to charge.” The TSA’s cautious approach makes sense given the high-traffic nature of airports and the valuable data stored on travelers’ devices.

Read full article ▼
The Transportation Security Administration recently warned travelers against the dangers of ‘juice jacking’—but it may not be as common as you think.

Juice jacking can occur when criminals install malware into public charging stations.

Occurrences of juice jacking are rare, but possible—and it’s always a good idea to protect yourself, just in case.

When was the last time you used a USB charging station at the airport? According to the Transportation Security Administration, you should think twice before charging your phone at one of those stations.

“Hackers can install malware at USB ports (we’ve been told that’s called ‘juice/port jacking’),” the TSA recently advised travelers on Facebook. “So, when you’re at an airport, do not plug your phone directly into a USB port. Bring your TSA-compliant power brick or battery pack and plug in there.”

The warning has sparked fresh concern about “juice jacking,” a cyberattack where criminals install malware on public charging stations to steal data from connected devices.

But how real is this threat for everyday travelers? We asked a few experts.

The Reality Check

A person using their tablet. Margot Cavin/Travel + Leisure

According to Calum Baird, a digital forensics expert, juice jacking is more theoretical than anything else. Despite the alarming warnings circulating online, Baird says he hasn’t encountered any actual cases in his professional experience.

“I see it pop up online every now and then, but most, if not all, modern smartphones now require confirmation prior to data transfer via USB,” Baird says.

Baird notes that even if travelers encounter compromised charging stations, most modern devices have built-in protections. Baird’s personal experiences are also backed by the Federal Communications Commission, and on its website, the organization states that although it is technically possible, the FCC is not aware of any confirmed cases of juice jacking.

The Real Danger Is The Cables

Plugging into a USB charging port. Grace Cary/Getty Images

Danny Jenkins, cofounder and CEO of ThreatLocker, offers another perspective on what travelers should actually worry about, and points to an unexpected source: deceptive USB-C cables.

“Shady USB-C cables likely pose the greater risk, partly because the dangers of public charging ports are more widely known,” he says.

Jenkins says that people have become more aware of the dangers associated with public charging stations, so they’re more cautious about using them. However, many travelers don’t think twice about buying a cheap charging cable from a questionable vendor at an airport shop or online marketplace, making these cables a more successful point of attack.

“Attackers are always searching for new exploits,” he says. “While upcoming measures may mitigate issues related to juice jacking, vulnerabilities could still emerge as attackers gain access to new USB technologies and attempt to bypass these protections.”

Here’s how to protect yourself.

A person plugging in a phone. Margot Cavin/Travel + Leisure

While it’s hard to find reports of actual juice jacking cases, it’s always a good idea to take extra precautions, just in case. Jenkins says that portable battery packs can help mitigate the chances of a juice-jacking attack.

If you don’t have any other options aside from a public charging station, Jenkins recommends checking for signs of tampering on the USB port area. Baird says to check your phone as you plug it in.

“If it’s asking you to trust a device you’ve connected to, decline,” he says. “It doesn’t need data transfer to charge.”

While juice jacking remains largely theoretical, the TSA’s cautious approach makes sense given the high-traffic nature of airports and the valuable data stored on travelers’ devices. However, modern smartphones have built-in protections, and a few simple precautions can drastically eliminate any risk.

Instead of avoiding public charging entirely, travelers can stay safe by bringing their own charging equipment, paying attention to device prompts, and being selective about where they source cables and adapters.

After all, a dead phone battery poses a more immediate risk than juice jacking for most travelers.

Source: Travelandleisure.com | View original article

Source: https://www.travelandleisure.com/what-is-juice-jacking-11756622

Leave a Reply

Your email address will not be published. Required fields are marked *