Law enforcement officials are issuing a new warning about public phone charging stations that many people use at the airport.
Hackers have figured out a way to hide malware that can be used to extract information from phones connected to those chargers, experts say.
It’s called “juice jacking,” which is accomplished by installing a skimming device inside the USB ports at public charging stations.
Bryan Seely, an expert hacker who uses his skills for good, said he can access banking apps, contact, emails and text messages in a matter of minutes through “juice jacking.”
“And with all this it wouldn’t take me long to scam one of your contacts by spoofing your number, calling as you and getting even more information about you,” he said. “Steal your identity. Empty your accounts.”
The spyware can also allow hackers to track victims even after they unplug from a public charger.
This type of malware can be installed quickly and won’t seem suspicious to the owner of the phone.
“That’s the danger,” Seely said. “Never, ever, ever use public chargers.”
If you’re in a pinch and need a charge, there’s a device you can buy for under $10 called a “data blocker” that protects you at public ports.