# Juice jacking

> mobile security risk

**Wikidata**: [Q22053969](https://www.wikidata.org/wiki/Q22053969)  
**Wikipedia**: [English](https://en.wikipedia.org/wiki/Juice_jacking)  
**Source**: https://4ort.xyz/entity/juice-jacking

## Summary
Juice jacking is a mobile security risk where malicious actors use public USB charging ports to steal data or install malware on connected devices. It exploits the fact that USB ports can transmit both power and data, allowing attackers to access personal information when users charge their devices in public places.

## Key Facts
- Classified as an information security risk and security risk
- Known by aliases "充電器欺詐" and "充電偷竊" in Chinese
- Has Wikipedia articles in 9 languages: German, English, Spanish, French, Italian, Malayalam, Manipuri, Portuguese, Swedish, and Tamil
- Described on Wikidata as a "mobile security risk"
- Has 11 sitelinks across Wikimedia projects
- Listed in Google Knowledge Graph with ID /g/11bw5xp56_

## FAQs
### Q: What is juice jacking?
A: Juice jacking is a security exploit where criminals use public USB charging stations to steal data from or install malware on connected devices. It takes advantage of the dual-purpose nature of USB connections that carry both power and data.

### Q: How can I protect myself from juice jacking?
A: To protect against juice jacking, use your own charging cable and AC adapter with a standard electrical outlet, carry a portable battery pack, or use USB data blockers that allow charging while blocking data transfer.

### Q: Where does juice jacking typically occur?
A: Juice jacking commonly occurs at public charging stations in airports, hotels, conference centers, and other locations where people frequently need to charge their devices while traveling or working.

## Why It Matters
Juice jacking represents a significant threat in our increasingly mobile and connected world, where people regularly rely on public charging infrastructure. This security vulnerability can lead to serious consequences including identity theft, financial fraud, and unauthorized access to personal and corporate data. As more people depend on smartphones and tablets for both personal and professional activities, the potential impact of juice jacking attacks has grown substantially. The risk is particularly concerning because it exploits a basic convenience that users expect - the ability to charge devices anywhere - making it a stealth threat that can compromise security without users' knowledge. Understanding and mitigating juice jacking is crucial for maintaining digital privacy and security in public spaces.

## Notable For
- Exploits the dual-purpose nature of USB connections for power and data transfer
- Represents a physical security threat that bridges the gap between hardware and software vulnerabilities
- Targets the growing dependency on mobile devices for daily activities
- Can compromise both personal and corporate data through a single connection
- Demonstrates how everyday conveniences can be weaponized for cybercrime

## Body
### Technical Mechanism
Juice jacking exploits the fact that USB connections were designed to carry both electrical power and data signals through the same cable. When a device connects to a compromised USB port, the connection can be used to access files, install malware, or copy sensitive information without the user's knowledge.

### Attack Variations
There are several forms of juice jacking attacks, including data theft where information is copied from the device, malware installation where malicious software is loaded onto the device, and multi-device attacks where compromised devices spread malware to other connected devices.

### Prevention Methods
Security experts recommend several prevention strategies including using AC power outlets instead of USB ports, carrying personal charging equipment, utilizing USB condoms or data blockers that physically prevent data transfer while allowing charging, and keeping devices locked while charging.

### Industry Response
The threat of juice jacking has led to increased awareness campaigns by cybersecurity professionals and some manufacturers are developing charging-only USB cables that physically disable data pins while maintaining power delivery capabilities.