Smartphones at risk of data hack via USB charging port
Kaspersky revealed devices could be attacked when charging them at public facilities at airports, cafes and on public transport
Kaspersky has revealed smartphones and devices can be hacked when they're charged at public charging points such as airports, cafes and shopping centres and other places.
The company tested devices running different versions of iOS and Android to see what data is transferred while connected to a Mac or PC for charging.
Kaspersky researchers discovered that a large amount of data is sent to the computer when it's first plugged in, including the device name, device manufacturer, device type, serial number, firmware information, operating system information, file system/file list and electronic chip ID.
Although the extent of the data that moves to the computer during this 'handshake' varies according to manufacturer and version of the operating system in use, it still transferred the device name, manufacturer and serial number in all cases.
Kaspersky discovered that although this isn't a direct security risk if only a few of the details were syphoned off by hackers, the fact the version of firmware in use and unique device identifier could mean hackers are able to target the device with a specific exploit.
This proof of concept was first uncovered in 2014 when researchers were able to infect devices with malware using AT commands via fake charging stations in public places, but it would seem the method would still work.
"It is strange to see that nearly two years after the publication of a proof-of-concept demonstrating how a smartphone can be infected through the USB, the concept still works," Alexey Komarov, researcher at Kaspersky Lab said.
"The security risks here are obvious: if you're a regular user you can be tracked through your device IDs; your phone could be silently packed with anything from adware to ransomware; and, if you're a decision-maker in a big company, you could easily become the target of professional hackers."
What you need to know about migrating to SAP S/4HANA
Factors to assess how and when to begin migrationDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
Testing for compliance just became easier
How you can use technology to ensure compliance in your organisationDownload now
Best practices for implementing security awareness training
How to develop a security awareness programme that will actually change behaviourDownload now