Smartphones at risk of data hack via USB charging port
Kaspersky revealed devices could be attacked when charging them at public facilities at airports, cafes and on public transport

Kaspersky has revealed smartphones and devices can be hacked when they're charged at public charging points such as airports, cafes and shopping centres and other places.
The company tested devices running different versions of iOS and Android to see what data is transferred while connected to a Mac or PC for charging.
Kaspersky researchers discovered that a large amount of data is sent to the computer when it's first plugged in, including the device name, device manufacturer, device type, serial number, firmware information, operating system information, file system/file list and electronic chip ID.
Although the extent of the data that moves to the computer during this 'handshake' varies according to manufacturer and version of the operating system in use, it still transferred the device name, manufacturer and serial number in all cases.
Kaspersky discovered that although this isn't a direct security risk if only a few of the details were syphoned off by hackers, the fact the version of firmware in use and unique device identifier could mean hackers are able to target the device with a specific exploit.
This proof of concept was first uncovered in 2014 when researchers were able to infect devices with malware using AT commands via fake charging stations in public places, but it would seem the method would still work.
"It is strange to see that nearly two years after the publication of a proof-of-concept demonstrating how a smartphone can be infected through the USB, the concept still works," Alexey Komarov, researcher at Kaspersky Lab said.
"The security risks here are obvious: if you're a regular user you can be tracked through your device IDs; your phone could be silently packed with anything from adware to ransomware; and, if you're a decision-maker in a big company, you could easily become the target of professional hackers."
The essential guide to cloud-based backup and disaster recovery
Support business continuity by building a holistic emergency plan
Download nowHow do vulnerabilities get into software?
90% of security incidents result from exploits against defects in software
Download nowDelivering the future of work - now
The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.
Download now