Smartphones at risk of data hack via USB charging port

Kaspersky revealed devices could be attacked when charging them at public facilities at airports, cafes and on public transport

Kaspersky has revealed smartphones and devices can be hacked when they're charged at public charging points such as airports, cafes and shopping centres and other places.

The company tested devices running different versions of iOS and Android to see what data is transferred while connected to a Mac or PC for charging.

Kaspersky researchers discovered that a large amount of data is sent to the computer when it's first plugged in, including the device name, device manufacturer, device type, serial number, firmware information, operating system information, file system/file list and electronic chip ID.

Although the extent of the data that moves to the computer during this 'handshake' varies according to manufacturer and version of the operating system in use, it still transferred the device name, manufacturer and serial number in all cases.

Advertisement - Article continues below
Advertisement - Article continues below

Kaspersky discovered that although this isn't a direct security risk if only a few of the details were syphoned off by hackers, the fact the version of firmware in use and unique device identifier could mean hackers are able to target the device with a specific exploit.

This proof of concept was first uncovered in 2014 when researchers were able to infect devices with malware using AT commands via fake charging stations in public places, but it would seem the method would still work.

"It is strange to see that nearly two years after the publication of a proof-of-concept demonstrating how a smartphone can be infected through the USB, the concept still works," Alexey Komarov, researcher at Kaspersky Lab said.

"The security risks here are obvious: if you're a regular user you can be tracked through your device IDs; your phone could be silently packed with anything from adware to ransomware; and, if you're a decision-maker in a big company, you could easily become the target of professional hackers."

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now


Google Android

Best Android smartphones 2019

23 Dec 2019
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Microsoft Windows

Memes and Viking funerals: The internet reacts to the death of Windows 7

14 Jan 2020

Dell XPS 13 (New 9300) hands-on review: Chasing perfection

14 Jan 2020