
For nearly a decade, smartphone users have enjoyed built-in defenses against juice jacking assaults targeting USB connections. Unfortunately, a new type of juice jacking attack has emerged, skillfully circumventing these protections. In this guide, we will delve into understanding this novel threat and discover the savvy ways to safeguard your data.
Unpacking the New Juice Jacking Attack
Known as “choicejacking, ” this fresh wave of attacks has been highlighted by the researchers from Graz University of Technology. Their investigations revealed how malicious charging devices can be utilized to capture user data from phones.
In their experiments, the researchers assessed 11 different smartphones and successfully extracted data from 10 of them. While certain conditions must be met for the attack to succeed, access is alarmingly straightforward.

Here’s a step-by-step breakdown of how the choicejacking attack is executed:
- The victim’s smartphone must connect to a malicious charging device while the screen is unlocked.
- The charger operates as a keyboard, using the phone as a host. It sends commands to activate Bluetooth, ensuring the device is discoverable while establishing a connection with another Bluetooth component in the charger.
- By forming a typical USB data connection, the charger exploits the Bluetooth connection to simulate user interaction on the confirmation screen, facilitating data transfer.
- With the combined Bluetooth and USB data connections, it becomes possible to extract photos, documents, and app information.
Although currently viewed as an experimental vulnerability, experts anticipate that such attacks could manifest in public charging facilities, where hackers could easily implement their tools unnoticed.
The researchers also warned that if USB debugging is enabled on the phone, attackers can gain enhanced access using the Android Debug Bridge (ADB).This could allow for more invasive actions, like installing unwanted applications, accessing system files, and modifying device settings.
Effective Strategies to Safeguard Your Data
The discovery of this vulnerability led to proactive responses from Apple and Google, who have implemented protective measures. However, these solutions are not universal, making it crucial to adopt your own strategies to stave off potential attacks. Here are several robust methods to shield your data:
Avoid Public Charging Stations
Most juice jacking incidents occur in public charging settings, such as malls and airports. The most effective strategy is to steer clear of these locations for charging your phone. Carrying your charger or investing in a portable power bank can ensure you have a secure power source wherever you go.

Regularly Update Your Operating System
Both Apple and Google have incorporated pattern and biometric verifications for USB data connections in their latest operating system updates. Apple introduced this feature in iOS 18.4, while Google integrated it into Android 15.
Currently, this protection is confirmed on Google Pixel devices, with many other Android manufacturers hesitant due to possible impacts on user experience. Therefore, it’s important to update your iOS device to version 18.4 and, if available, upgrade your Android device to Android 15. Ensure you verify if your device prompts for authentication during USB connection attempts.
Utilize Charge-Only USB Cables or Data Blockers
Charge-only USB cables, which have been effective against juice jacking, work equally well for choicejacking. These cables lack data pins, preventing any data transfer even if connected to a compromised charging station.
A USB data blocker is an alternative device that attaches to your USB cable, obstructing any data signals from being transmitted. A great option for this is the JSAUX USB Data Blocker. JSAUX also provides a USB-C data blocker cable for users who prefer carrying a cable option.
Stay Vigilant with Your Device
If you absolutely must use a public charging station, keep a close watch on your phone for any unusual behavior. Examples include unexpected Bluetooth activations or prompts for USB connection mode selections. Should you notice any irregularities, disconnect your device immediately. Always ensure your screen lock is enabled if you must step away from your phone.
Ultimately, accessing publicly available technology like public Wi-Fi or charging stations does involve certain risks. Only connect your device to public utility devices when it’s necessary, and ensure all protective measures are in place. The best practice to avoid juice jacking attacks is to utilize a charge-only cable whenever possible.
For further enlightenment on this issue, check out our source article and images.
Leave a Reply