ChoiceJacking is a clever technique that can bypass security measures put in place to protect smartphones, especially Android devices. One method even works on Apple devices. Here’s how it unfolds: when a phone is plugged into a compromised charger, that charger acts like a USB host. It can trick the phone into thinking the user has given permission, allowing the charger to inject commands directly into the phone’s interface.
This exploitation opens two channels: one for input, which can mimic user actions, and another for file access, enabling theft of personal files. Recent studies have highlighted the growing threat of such attacks, raising alarms about the safety of public charging stations.
A key method involves the charger acting like a USB keyboard. It can send simple commands or even complex key combinations to the phone. This process can initiate various actions, such as opening a Bluetooth connection without the user’s knowledge. The charger utilizes a feature called USB Power Delivery (USB PD), which allows devices to negotiate power and data roles. This can create a scenario where the charger is seen as the host device, capable of manipulating the phone’s settings.
The process goes like this: when the device connects to the malicious charger, it establishes an interaction where the charger can control Bluetooth settings and generate fake consent for file access. In testing, this technique has been found effective on ten out of eleven smartphone models, demonstrating the alarming capabilities of this attack. While one model resisted due to lack of full USB PD support, the others fell prey within about 25 to 30 seconds.
Experts emphasize the importance of awareness. Users should be cautious when using public charging stations and consider using portable chargers or power banks as safer alternatives. It’s a good reminder that convenience can sometimes come at a high price, highlighting the need for enhanced security measures in mobile devices and public charging infrastructure.
For more information on USB Power Delivery and its implications, you can check out resources like How-To Geek.