Charging Phones In Public Is A Security Risk

laptop charging phone

Charging mobile devices using public sockets could be transmitting host of details, Kaspersky Lab warns

Mobile users have been warned that charging up their smartphones or tablets using public power sockets could expose their devices to criminals.

An investigation from Kaspersky Lab found that smartphones can even be compromised when charged using a standard USB connection connected to a computer.

Information including a device’s serial number, electronic chip ID and file system list can be revealed to third parties when such a service is used, meaning users could be unknowingly identified and even tracked.

At risk

charging phoneResearchers said both Android and iOS devices could be compromised when connected to a PC to charge, with the latter acting as an unwitting window into the user’s information.

Most of the data is transmitted during the handshake’ (a process of introduction between the device and the PC/Mac it is connected to), which can also include the device’s name, manufacturer and type.

In its investigation, the Kaspersky Lab team was able to show off the damaging effects a connection could bring, as they were able to re-flash a smartphone and silently install a root application on it, creating what they called “a total compromise” of the device.

“It is strange to see that nearly two years after the publication of a proof-of-concept demonstrating how a smartphone can be infected though the USB, the concept still works,” said Alexey Komarov, researcher at Kaspersky Lab.

“The security risks here are obvious: if you’re a regular user you can be tracked through your device IDs; your phone could be silently packed with anything from adware to ransomware; and, if you’re a decision-maker in a big company, you could easily become the target of professional hackers,.

“And you don’t even have to be highly-skilled in order to perform such attacks, all the information you need can easily be found on the Internet.”

The company is advising users to only trusted USB charging points and computers to charge a device, as well as setting up a password or fingerprint log-in using encryption technologies.

Are you a security pro? Try our quiz!