What is Juice Jacking?
An attack that compromises devices through public USB charging stations by transferring malware or stealing data through the power cable.
USB cables carry both power and data. Public charging stations can exploit this dual function.
How It Works
- A compromised charging station or cable sends data commands while charging
- Malware can be installed on the device
- Data can be extracted from the device
- The attack is invisible to the user
Prevention
- USB data blocker ("USB condom"): A device that allows only power, not data
- Charge-only cable: Cable with data wires removed
- Portable battery: Charge from your own power bank
- Wall adapter: Use your own power adapter in an AC outlet
Risk Level
While juice jacking has been demonstrated in labs, documented real-world attacks are rare. The FBI has warned about it, and the precautions are simple enough that they're worth taking.
Related Terms
Malware
Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Malware includes viruses, ransomware, spyware, trojans, and worms—each with different infection methods and objectives.
Operational Security
The practice of protecting sensitive information by thinking like an adversary to identify vulnerabilities in your own behavior and communications. OPSEC goes beyond technical tools to address human factors that could expose you.
Have more questions?
Use our guided flow to get the right next privacy step for Juice Jacking.
Open Guided Flow