AWARE OF JUICE JACKING ATTACK ( OR )PUBLIC CHARGING PORT ATTACK :



AWARE OF JUICE JACKING ATTACK ( OR )PUBLIC CHARGING PORT ATTACK :







What is juice jacking?
 
Juice Jacking Attack is known as Public Charging Port Attack this attack done by hacker's or the attacker's to steal the information from victim's device. when your phone is connected to the USB cable at the public charging port this attack takes place. 

Hackers use the advantage of public charging ports and they steal your  DATA from your phone they will install   Malware in your device when you keep your device for charging in the public charging ports.



How do attackers steal our data when we  :

  • When we keep our device for the charging purpose in the public charging ports the hacker or attacker will use the software or tools and they  place it inside the charging port. We think that  it is a normal  charging port. But that charging port is the 3rd person's device from which he can access our data .
  • When we keep it at that port we get the notification in that notification  it will ask to transfer the data or to charge our phone when you click on the transfer the data then the entire phone's data will go to the hacker and he will install the malware or  spyware in your phone.
  • When he installs malware or spyware then he can control your phone by sitting somewhere in the world.
  • Never ever use the public charging ports for charging purpose when you keep it then we dont know whats gonna happen in our phone and the entire phone will be controlled by the hacker.
  • Juice jacking is also known as MITM [man in the middle] attack.
  • The software or tools which are used by the hackers are highly advanced ones they can enter into your bank account when they need and they can hack entire phone details  from you and they may sell them in the DARK WEB for money purpose.
  • So many cases are registered regarding juice jacking people don't know they will think that this is a normal public charging port,yeah it is normal public charging port but if we open and see how many connections are there then you just be shocked.

  • Once see the image of that phone. It means that when we keep our phone in the port then phone also gets charged and our data also gets transfer to the attacker equally. 
  • We feel that our phone is getting charged but we don't know what is happening behind charging port.
Precautions should be taken by the people when you are going out home:

  • Never ever use  public charging port.
  • If you use the public charging port then better to switch off your phone .
  • Use power banks wherever you go. If you want then you can charge the power bank in the public charging port.

  • If you are using public charging port then disable you data transfer option on your phone.
  • After removing your phone from the public charging port please go to settings and check ones whether any malicious apps or APK  apps are installed in your phone . Because hackers will install the APK or malware files in your phone by which they can again hack your phone if they want.
  • Try to avoid Public Charging Ports try to use Power Banks.


Follow us on Instagram for more updates and if you have any doubts you can ask us.





If any one is interested to start their career in hacking, AI ( Artificial Intelligences ), Crypto technology then join in TCA ( The Cyber Agents) this platform gives you more knowledge and more information about this things : https://thecyberagents.com/










Reactions

Post a Comment

0 Comments