Argument Based Credentials (ABC)
Originality Test Ratio:
Peer Reviewers Comment:
Blind Reviewers Remarks:
Editorial Board Citation:
Published Online First:
In this modern world, the mobile phone is an integral part of our daily life.
In today’s world, mobile phones are not used only for calling purpose
but also for a host of other purposes that includes: photography, business
transcations, video and audio recodings etc. Making easy payment within a
fraction of seconds by simply using payment apps and the other online methods
on the internet is what has been revolutionised by mobile phones. As these new
methods of payments make transactions easy, it also gives birth to a number of
problem with online frauds topping the list among others. As the technologies
grow day by day the money related frauds are also witnessing a spike . In the
article under reference , the new method of data theft, done by simply charging
cable i.e the USB charging cable is being taken up. This type of the cyber attack
is called the juice jacking method.
• Mobile Phone
• Data Theft
The smart phones are now everywhere. Nobody is left in the world who is not familiar with the smartphone , its use and the benefits it offers. In the smart phone era, the charging method of battery is also smart. USB cables are used for mobile charging. You might have the most costly and latest mobile phone but you cannot stop your data being stolen with so much ease. It only needs a charging station with power connectivity with cable. The data/ power cable that we used in the public charging station, gives unauthorized access to the attackers to steal our data. When the cyber attacks are done with these USB cables for stealing data, related to your personal life or any type of data theft , then it is called the juice jacking method. In this method the attacker simply steals all your mobile phone data, related to your personal stuff, contact details, bank details, passwords, browser cookies and all important data , which may affect you financially.
On the basis on internet news ,I found a case related to juice jacking which is stated as under:
Mr. Mishra was at the airport when he found that his mobile battery had nearly drained out and was extremely low and needed to be recharged . So he plugged his mobile phone on public charging points . After a few hours , he has received an unauthorised debit SMS of Rs. 80000 in his account. On investigation, it was found that the said charging ports were neither monitored nor checked and the attacker simply temper the cord. The cord contains a chip that has spy malware that provides access to all the information stored in Mr Mishra mobile phone to the attacker device. The attacker then use these information for unauthorised money transaction.
Contact immediately your bank in case of unauthorised debit.
Working of juice jacking :
As we noticed that when we use the USB cable for laptop, or mobile phone charging it pops up some option while used to charging only or data transfer. It means it not only used for power charging purpose but also used for data transfer. In every regular USB cable has 4 to 5 pins, in which only one pin used for the charging and others are used for data transfer. The attacker used chip to interact with target mobile through USB cable. Which allows target USB data transfer pins to transfer all the data to the attacker device. The attacker use some type of malicious hardware that get installed on the public charging points. These are specially designed to install malicious code or apps on the target which helps attackers to gain the access of target devices. As soon as they get the access we may lose the mobile data. Or we can say that we are hacked
Types of juice jacking :
In this type ,the attackers or cyber criminals steal all the data through USB cables. There are crawlers that can search your mobile phone for personally identifiable informatio n (PII), account details, banking-related information, debit card details, credit card details and the other money transfer related apps i.e. user’s name and passwords etc. within a fraction of seconds. There are lots of freeware apps and software available on the internet which clone target phones. It simply helps the attackers to get all the relevant information to perform smooth attack. On the internet or dark web various sources are available to provide the PII data which is sold on the dark web. Malware installation. The second way to install the malware on to the target device thought USB cable. On the internet or app store lots apps are available who help the attacker to install a malware onto the target mobile phones. These malware installed by the using the juice- jacking methods including the adware, spyware, ransom ware or Trojan. In fact ,android malware is mostly used now days. Spyware monitors the device for long time, whereas the ransom ware code freezes the device and encrypts all the data.
How to avoid being trapped:
Avoid public charging points or use power bank:-
The very first method is to stop or avoid using the public charging point. Try use the private charging sources, if possible to carry a power bank or charge your mobile phones completely before leaving the home/ workplaces. Try to lessen the use of mobile phone while traveling. For a long distance travelling always use your own chargers or power bank.
Lock your mobile phones :-
Make sure that you completely lock your mobile phone and don’t give it to the unknown person for any reason. There are various locking methods available in the newly smartphones, i.e pin, pass code, draw patterns etc. But now days avoid using facelocks and finger lock because these locks are easily and fast accessible within fraction of seconds.So, make sure that phone securely locked and don’t unlock at public charging point.
Switch off the mobile phone while charging:-
Try to charge your mobile phone switched off conditions.In earlier mobile phones, there is a facility available in old mobile , but nowadays almost all mobile phones have these facilities inbuilt.
Used special cables:-
In the market, there are lots of special cables which only meant for charging. So try to buy ,carry and use these types of cables at the time using public charging points. These cables are only for charging and not meant for data transfer. It will help at some distant to become a juice jacking victim.
Use a USB Condom( Data blocker):-
It is a normal device which is plugged between user cable and usb port to prevent the data transfer. In other words, this power adapter permits the user only to charging the device and halts the data transfer. In the above picture t, a USB condoms (Data blocker device) is plugged on the usb cable.
Some factors of using USB
condoms are :
•Charge mobile phone without
worrying at public charging
•Turn a normal cable to charge
•Place it “always on” on our exiting
Install an antivirus:- Make sure to Install an antivirus solution that stops any malware to download data theft.There are lots of paid anti- virus software available on the internet.
In the month of December 2019, the SBI bank issued a message on social media platform warning the public against the use of charging points.
Install an antivirus solution that stops any malware to download data theft .The best defence against any type of these attacks is to awareness and the safe use of mobile phones in public places .
Review 1: By way of you may have noticed, when you change your phone done the USB port of your computer or laptop, this also opens
up the selection to change files spinal and forth amid the two systems.
Review 2: Except you have complete vicissitudes in your locations, the statistics transfer mode is incapacitated by default, except on devices consecutively older Android versions.
Review 3: In the first type of juice-jacking bout, cybercriminals could bargain
any and all data from movable devices connected to charging positions through their USB ports. But there’s no hoodie-wearing hacker sitting behind the panels of the kiosk.
Author is highly indebted to Scholastic Seed Inc& editorial team of Cybernomics, For making the write-up in the shape of an article.
All views expressed in this paper are my/our own. Some of the content is taken from open source websites & some are copyright free for the purpose of disseminating knowledge. Those some We/I had mentioned above in the references section and acknowledged/cited as when and where required. The author/s has cited their joint own work mostly, Tables/Data from other referenced sources in this particular paper with the narrative & endorsement has been presented within quotes and reference at the bottom of the article accordingly & appropriately. Finally some of the contents which are taken or overlapped from open source websites for the knowledge purpose.Those some of i/we had mentioned above in the references section.
Shivani Sanwal & Kamaljit Singh
“Juice Jacking - A type of Cyber attack”
Volume-2, Issue-1, Jan 2020.
Frequency: Monthly, Published: 2020
Conflict of Interest: Author of a Paper
had no conflict neither financially nor