Magazine

How Cyber Attackers Access Mobile Phones When Charging In Public

Posted on the 28 January 2022 by Maxiel

How Cyber Attackers Access Mobile Phones When Charging In Public

In line with a report by The PUNCH, the Nigerian Communications Fee's Cyber Safety Incident Response Crew has alerted Nigerians on a technique utilized by cyber attackers to realize unauthorised entry into unsuspecting cell phone customers gadgets after they cost their cell phones at public charging stations.

NCC-CSIRT stated the strategy, referred to as Juice Jacking, is a part of two cyber vulnerabilities it recognized, the opposite being Fb for Android Buddy Acceptance Vulnerability, which targets solely Android Working System.

This was disclosed in an announcement titled, 'NCC-CSIRT Identifies Two Cyber Vulnerabilities,' signed by the Director, Public Affairs, Dr Ikechukwu Adinde.

"When an attacker gains access to a user's Mobile phone, he gets remote access to the User's phone which leads to breach in Confidentiality, Violation of Data Integrity and bypass of Authentication Mechanisms. Symptoms of attack may include sudden spike in battery consumption, device operating slower than usual, apps taking a long time to load, and when they load they crash frequently and cause abnormal data usage."

The NCC-CSIRT, nevertheless, proffered options to incorporate utilizing 'charging only USB cable' to keep away from Common Serial Bus (USB) knowledge connection; utilizing one's AC charging adaptor in public house; and never granting belief to transportable gadgets immediate for USB knowledge connection.

"In recent times, NCC-CSIRT has raised series of cyber-vulnerability awareness based on security advisories it receives from the Nigerian Cybersecurity Emergency Response Team (ngCERT), which is the national body for the implementation of the NCPS objective. However, Juice Jacking and Facebook for Android Friend Acceptance Vulnerabilities are the two first-ever cyber vulnerabilities published by the NCC-CSIRT," the assertion concluded.


Back to Featured Articles on Logo Paperblog