Fact-checked by Grok 2 weeks ago
References
-
[1]
CYBERSECURITY FACT SHEET: Juice JackingApr 19, 2022 · Juice jacking is a cyber attack in which a compromised Universal Serial Bus (USB) charging station transfers malware to, or steals personal information from, a ...
-
[2]
Why is 'Juice Jacking' Suddenly Back in the News? - Krebs on SecurityApr 14, 2023 · A term first coined here in 2011 to describe a potential threat of data theft when one plugs their mobile device into a public charging kiosk.
-
[3]
Juice Jacking - Communications of the ACMSep 25, 2025 · Juice Jacking Realities News reports say the first demonstration of an automated attack using juice jacking took place at the 2013 Black Hat ...
-
[4]
How Serious Is the Security Threat of 'Juice-Jacking'? | Snopes.comApr 12, 2023 · Cybercriminals are using public USB ports in places like airports and hotels to introduce malware and monitoring software onto users ...
-
[5]
Juice Jacking: Security Issues and Improvements in USB TechnologyNumerous methods are used to prevent juice jacking. These include ensuring devices are charged, avoiding the use of USB chargers, turning off gadgets while not ...<|control11|><|separator|>
-
[6]
What is 'Juice Jacking' and Tips to Avoid ItApr 27, 2023 · You could become a victim of "juice jacking," yet another cyber-theft tactic. Cybersecurity experts warn that bad actors can load malware ...
-
[7]
What Is Juice Jacking? - McAfeeJuice jacking is a type of cyber attack where public USB charging ports are used to steal data from or install malware on your device.
-
[8]
What is juice jacking? Think twice before using public USB portsAug 7, 2018 · The term juice jacking was first coined in 2011 after researchers created a compromised charging kiosk to bring awareness to the problem. When ...
-
[9]
Survey reveals interesting details about American phone charging ...Nov 10, 2022 · 88% of respondents reported using a wired charger. In addition, 46% said they use car chargers, 28% use wireless chargers, and 19% reported ...
-
[10]
Juice Jacking Attack - Sepio CyberA juice jacking attack takes advantage of the trust users place in public USB charging ports. Once a compromised cable or port is used, malicious software ...How A Juice Jacking Attack... · Can Juice Jacking Chargers... · Understanding A Juice...
-
[11]
Explained: juice jacking | Malwarebytes LabsNov 21, 2019 · Juice jacking is a type of cyberattack that uses a USB charging port to steal data or infect phones with malware. Learn how it works and ...
-
[12]
None### Summary of Juice Jacking Attack Mechanism
-
[13]
Beware of Juice-Jacking - Krebs on SecurityAug 17, 2011 · “One thing we discovered: On certain devices, if you power them completely off, then charge them, they don't expose the data,” Markus said. This ...
-
[14]
[PDF] Mactans: Injecting Malware into iOS Devices via Malicious ChargersTo demonstrate practical application of these vulnerabilities, we built a proof-of-concept malicious charger, called Mactans, using a BeagleBoard. This hardware ...Missing: 2013 | Show results with:2013
-
[15]
This Fake Charger Will Hide A Trojan In Your iPhone's Facebook AppJul 31, 2013 · The Mactans charger researchers built to infect iPhones with a spoofed Facebook trojan. Apple takes great pains to protect its air-tight iOS ...
-
[16]
Black Hat: Researchers Use iPhone Charger As Hacking ToolAug 1, 2013 · Using a Beagleboard, the researchers built a proof-of-concept malicious charger they refer to as Mactans. By. Brian Prince. | August 1, 2013 (4: ...
-
[17]
Black Hat: Don't Plug Your Phone into a Charger You Don't OwnAug 1, 2013 · That simple iPhone charger seems innocent enough, but a Black Hat presentation revealed that a rogue charger could totally own your phone.
-
[18]
Hacked iPhone chargers could let snoops spy on devices - CBS NewsAug 7, 2013 · A device called Mactans presented at the Black Hat conference can mimic an Apple iPhone charger and install malicious software.
-
[19]
Mactans iOS Charger Malware Hack - Business InsiderAug 2, 2013 · A demonstration at Black Hat, a Las Vegas conference on network security, showed that a hacked charger could totally own your iPhone, reports PC ...
-
[20]
[PDF] CAC Summary 12-11-2019 - Federal Communications CommissionJuice jacking uses public charging ports to steal information from and load malware onto devices. Consumers are encouraged to use wall outlets to charge their ...
-
[21]
Juice jacking: Why you shouldn't use public charging stations ...Apr 11, 2023 · Juice jacking is a type of cyberattack in which a hacker manages to steal data from a smartphone, tablet or other electronic devices while it's being charged ...
-
[22]
USB in a NutShell - Chapter 2 - Hardware - BeyondlogicA USB device must indicate its speed by pulling either the D+ or D- line high to 3.3 volts. A full speed device, pictured below will use a pull up resistor ...
-
[23]
[PDF] Understanding USB Insecurity in Versions 1 through CAbstract—USB-based attacks have increased in complexity in recent years. Modern attacks now incorporate a wide range.
-
[24]
[PDF] Off-Path Injection Attacks on USB Communications - USENIXAug 9, 2023 · Attacks on USB Confidentiality and Integrity. USB's lack of any encryption and authentication mechanisms allows ad- versaries to eavesdrop on ...
-
[25]
Beware of Juice Jacking - State of MichiganThis happens when hackers install and hide a skimming device inside the USB ports of the kiosk. When phones are plugged in to charge, the skimming device ...
-
[26]
(PDF) The Cyber Crime of Juice Jacking in Developing EconomiesAug 6, 2025 · This paper formulates a simple architecture for Juice Jacking cyber-crime, review prove-of-concept experimentation for Juice Jacking from ...
-
[27]
[PDF] Monthly Cybersecurity Newsletter Russian Hackers Win BigFeb 2, 2024 · The risks associated with juice jacking are profound. Beyond the immediate threat of malware infection and data theft, the implications can ...Missing: consequences effects
-
[28]
economic risks in the digital era with special reference to cyber fraud ...Oct 17, 2024 · ... Juice jacking victims could experience identity theft and financial losses, which. could have serious negative effects on their economy.
-
[29]
SandUSB: An installation-free sandbox for USB peripheralsFeb 9, 2017 · This work investigates two emerging attacks - Human Interface Device (HID) attack and Juice Jacking attack - that leverage USB peripherals, and
-
[30]
iOS and Android juice jacking defenses have been trivial to bypass ...Apr 28, 2025 · “Juice jacking” was coined in a 2011 article on KrebsOnSecurity detailing an attack demonstrated at a Defcon security conference at the time.Missing: Krebs | Show results with:Krebs<|control11|><|separator|>
-
[31]
[PDF] ChoiCeJaCking: Compromising Mobile Devices through Malicious ...Aug 13, 2025 · Abstract. JuiceJacking is an attack in which malicious chargers com- promise connected mobile devices. Shortly after the attack.
-
[32]
ChoiceJacking: Compromising Mobile Devices through Malicious ...In this paper, we present a novel family of USB-based attacks on mobile devices, ChoiceJacking, which is the first to bypass existing JuiceJacking mitigations.
-
[33]
Data theft during smartphone charging - KasperskyMay 27, 2025 · The ChoiceJacking attack: stealing smartphone photos and data while charging via USB ... This attack became known as juice-jacking, and both ...
-
[34]
Warning: Protect your phone from choicejacking before it's too lateJul 29, 2025 · Choicejacking is actually a more advanced upgrade to the older practice of juicejacking. With juicejacking, hackers install software on charging ...
-
[35]
'Juice Jacking' Criminals Use Public USB Chargers to Steal DataNov 8, 2019 · In the USB Charger Scam, often called “juice jacking,” criminals load malware onto charging stations or cables they leave plugged in at the stations.Missing: FBI | Show results with:FBI
-
[36]
FBI warns against using public USB charging ports - ABC NewsApr 11, 2023 · The FBI is warning the public against using charging stations in malls and at airports, according to a tweet from the bureau's Denver office.<|control11|><|separator|>
-
[37]
TSA Issues Security Warning About 'Juice Jacking' in U.S. AirportsJun 12, 2025 · “Juice jacking” is where hackers manipulate public charging stations with hidden devices to steal data or install malware on your device.<|control11|><|separator|>
-
[38]
Juice jacking warnings are back, with a new twist | MalwarebytesJun 3, 2025 · Juice jacking is where an attacker uses a malicious public USB charger to install malware on, or steal information from, your phone.Missing: definition | Show results with:definition
-
[39]
Device security guidance - NCSC.GOV.UKOur Device Guides cover the full range of concerns from choosing and purchasing devices to the advice you should give to end users.Missing: travel | Show results with:travel
-
[40]
Juice Jacking: How USB Ports Steal Your Mobile Data 2025Aug 26, 2025 · Juice jacking attacks exploit public USB charging ports to steal data and install malware on mobile devices. With 40% of mobile users having ...Missing: percentage | Show results with:percentage
-
[41]
Juice jacking: Find out how public USB charging ports put you at risk ...Oct 1, 2025 · Cybersecurity experts warn of juice jacking. Learn how hackers can get your information through public USB charging ports.
-
[42]
CSI Cyber and the Juice Jacking Airplane Wi-Fi White WhaleApr 30, 2015 · His boss comes in and yells at him for sucking. Sifter's excuse for telling his boss absolutely nothing about his decision to ground hundreds of ...Missing: films | Show results with:films
-
[43]
Smashing Security podcast #155: Juice jacking, YouTube hacking ...Nov 21, 2019 · Smashing Security podcast #155: Juice jacking ... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, ...
-
[44]
TOSS C3 Podcast - Juice Jacking Episode 44 - Spotify for CreatorsJuice Jacking: How Hackers Use Public Charging Stations to Steal Your Data. In this episode of the TOSC3 Podcast, cybersecurity expert Greg Hanna uncover a ...
-
[45]
Phishing for Compliments - Apple PodcastsIn episode 4, I go over the alleged threat of Juice Jacking, which turns into ANOTHER kind of jacking, and ends with VPNs. Then, a teaser for the next show! *** ...
-
[46]
Juice jacking happens when cybercriminals use public ... - InstagramJan 13, 2025 · It works because these USB ports can transfer both power and data. When you plug your phone or device into a compromised port, hackers can ...Missing: trends | Show results with:trends
-
[47]
#Juice Jacking - Search / XThe latest posts on #Juice Jacking. Read what people are saying and join the conversation.
-
[48]
PortaPow USB Data Blocker - Protect Against Juice Jacking (Red, 1)30-day returnsPortaPow has the only data blocker where the two wires which carry data have been physically removed, so you can be sure it is working.
- [49]
-
[50]
Phone Charging Stations for Government Facilities### Summary of Hardware Features Preventing Juice Jacking
-
[51]
What is USB Restricted Mode on iPhone? - Certo SoftwareApr 11, 2025 · Apple's USB Restricted Mode is a security feature designed to protect your iPhone or iPad from unauthorized data access through the Lightning or USB-C port.
-
[52]
Allow USB and other accessories to connect to your iPhone or iPadOct 23, 2025 · Open the Settings app, then tap Privacy & Security · Scroll down to Security, then tap Wired Accessories. Wired Accessories in Privacy and ...
-
[53]
Lockdown mode in Android 15 protects your phone from 'juice jacking'Jun 12, 2024 · When lockdown mode is enabled in Android 15, USB data access will be disabled, preventing potential "juice jacking" attacks.Missing: restricted | Show results with:restricted
-
[54]
Protection against juice jacking - Archive - Norton CommunityApr 12, 2023 · Juice jacking can infect user device with Malware. N360 app will protect user against Malwares. N360 System advisor feature will warn if “USB debugging” is ...
-
[55]
Protect Your Phone From Juice Jacking: Public Charging Risks ...Nov 13, 2024 · Experts interviewed by journalists have been clear: the risk of compromising a smartphone through a USB port in a café or similar public setting is low.
-
[56]
Juice Jacking: When Charging Your Device Opens the Door to ...May 22, 2025 · Juice jacking uses USB connectors to carry both power and information. Attackers hack USB ports to insert malware or create data pathways.
-
[57]
How to recognize and prevent juice jacking attack | NordLayer BlogLet's dive deeper. Juice jacking is all about two things: stealing your business data and leaving behind nasty surprises in the form of malware.