Skip to content

MSN Technology

Tech Solutions for a Smarter World

Menu
  • About MSN Technology
  • Contact Us
  • Write for Us
Menu
scary usb juice jacking whooooo 1152x648

iOS and Android juice jacking defenses have been trivial to bypass for years

Posted on April 28, 2025

All three of the three techniques of choice jacking defeat Android Jose Jacking Jacking. One of them also works against these defenses in Apple devices. In all three, the charger works as a USB host to mobilize the verification indicators on the targeted phone.

The attacks then exploit various weaknesses in the OS, which allow the charger to inject “input events” in an autonomous injection that can insert the text or click buttons indicate on the screen as the user has done it directly into the phone. In these three, the charger eventually receives two conceptual channels on the phone: (1) an input that allows the consent of the user to accelerate and (2) the connection of the files that can steal files.

choicejacking illustration

An example of election jacking attacks. (1) The affected device is connected to a malicious charger. (2) The charger sets an additional input channel. (3) Charger launches data connection. This requires user consent to confirm. (4) The charger uses the input channel to fake the consent of the user.


Credit: DraSch Bachar et al.

It’s a keyboard, it’s a host, it is both

Apple- and Google’s underlying juice Jacking Yetfius, in the electoral jacking variations, begins as a charger USB keyboard or similarly peripheral device. It sends the keyboard input to the USB that requests easy key presses, such as arrows up or down, but even more complex key combinations that mobilize the settings or open the status bar.

The input sets up a Bluetooth connection from the other ManteOred keyboard hidden inside the malicious charger. The charger then uses USB power supplyUSB-C connectors have a standard available that allows devices to either other tools or to receive electricity, depending on the messages they exchange, this process is known as USB PD data roll exchange.

simulated choicejacking charger

An artificial choice jacking charger. Bilateral USB lines allow to change the role of the data.


Credit: DraSch Bachar et al.

With the charger now working as a host, it triggers a file access dialogue. At the same time, the charger still maintains its role as a peripheral device that acts as a Bluetooth keyboard that approves a file access dialogue.

Complete steps for the attack provided in the Usenic Paper, these are:

1. The affected device is connected to a malicious charger. The device’s screen is open.
2. At a reasonable moment, the charger uses USB PD data roll (DR). The mobile device now works as a USB host, the charger uses as a USB input device.
3. The charger develops input to ensure that BT is active.
4. The Charger Mobile Device visits the BT pair screen in System System Settings to discover.
5. Charger starts advertising as a BT input device.
6. By constantly scanning for newly discovered Bluetooth devices, the charger mobile device identifies the BT device address and launches the pair.
7. Through the USB input device, the charger accepts yes/no pair dialogue appearing on the mobile device. The Bluetooth input device is now connected.
8. Charger sends another USB PD Dr exchange. Now it is USB host, and the mobile device is the USB device.
9. As a USB host, the charger launches data connection.
10. Through the Bluetooth input device, the charger confirms your data connection on the mobile device.

This technique works against everyone except one of the 11 phone models, in which holdout is an Android device operating Vivo Fentch OS, which does not fully support the USB PD protocol. Attacks against the remaining 10 models depend on the hack of the phone model, it takes about 25 to 25 to 30 seconds to set the Bluetooth pair. The attacker then reads access to the file stored on the device until he is connected to the charger.

Source link

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Huawei’s first trifold is a great phone that you shouldn’t buy
  • Graduation gifts 2025: 28 unique and practical ideas
  • Epic asks judge to make Apple let Fortnite back on the US App Store
  • The 18 best outdoor deals from REI’s big anniversary sale
  • How a DoorDash driver scammed the company out $2.5 million

Recent Comments

  1. How to Make a Smart Kitchen: The Ultimate Guide - INSCMagazine on Top Smart Cooking Appliances in 2025: Revolutionizing Your Kitchen
  2. Top Smart Cooking Appliances in 2025: Revolutionizing Your Kitchen – MSN Technology on Can I Control Smart Cooking Appliances with My Smartphone?
  3. Venn Alternatives for Remote Work: Enhancing Productivity and Collaboration – MSN Technology on Top 9 AI Tools for Data Analytics in 2025
  4. 10 Small Business Trends for 2025 – MSN Technology on How To Extending Your Business Trip for Personal Enjoyment: A Guide

Archives

  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024

Categories

  • Business
  • Education
  • Fashion
  • Home Improvements
  • Sports
  • Technology
  • Travel
  • Uncategorized
©2025 MSN Technology | Design: Newspaperly WordPress Theme
Go to mobile version