Try GOLD - Free
Think That USB Port's JUST FOR CHARGING? Think Again.
Electronics For You
|October 2025
Low battery. No outlet. That public USB port looks like a lifeline-but it could be a hacker's keyboard in disguise. Enter choicejacking-a next-generation cyberattack that hijacks our phone without permission. No taps. No clues. Just stolen access. If we care about our data, we must not plug in until we know what that charger is really doing.

Ever used a public charging station at an airport, coffee shop, or hotel? We have all been there—low battery, no outlet in sight, and that USB port seems like a lifeline. But what if that innocent-looking charger could hijack our phone—in less time than it takes to blink?
Welcome to the world of choicejacking—a stealthy, next-generation cyberattack that has security researchers sounding alarms. Unlike old-school juice jacking that required us to click something or fall for a fake app, choicejacking needs nothing from us at all. That is what makes it so dangerous. Let us unpack what it is, how it works, and why—if we care about our data—we should never trust a public USB port again.
What exactly is choicejacking
Let us start with a scenario. We plug our phone into a free USB port to charge. Normally, a prompt appears: “Allow this device to access your data?” We tap No and remain safe. With choicejacking, that prompt flashes for a microsecond—and the charger has already tapped Yes. Silent access in under 133 milliseconds—faster than our eyes can blink.
Choicejacking is the latest evolution in USB-based cyberattacks, discovered by a team of researchers from Graz University of Technology in Austria. Unlike earlier attacks that required malware or questionable apps, this one spoofs our own inputs—sending fake touch or keyboard commands to trick our phone into thinking we gave permission. The charger pretends to be us. This new kind of cyberattack exploits human interface device (HID) emulation—the same USB protocols we use daily to test hardware or connect peripherals are being turned against us.
Under the hood: How the attack works
When we plug into a malicious charger, we are not just drawing power. That charger can double up as:
• A USB host
• A spoofed keyboard or touchscreen (HID)
• A seemingly harmless power source
This story is from the October 2025 edition of Electronics For You.
Subscribe to Magzter GOLD to access thousands of curated premium stories, and 10,000+ magazines and newspapers.
Already a subscriber? Sign In
MORE STORIES FROM Electronics For You

Electronics For You
5 Interesting Reference Designs For WEARABLE ELECTRONICS
Build wearables faster with sensors, Bluetooth, and extended battery life-powered by ready-to-use reference designs.
3 mins
October 2025

Electronics For You
Delay-Off APPLIANCE TIMER
This delay-off timer is a cost-effective, reliable, and easy-to-assemble device for automating time-based switching operations.
3 mins
October 2025

Electronics For You
WATER LEVEL And TEMPERATURE MONITOR With TFT Graphics Using Arduino
Water and temperature monitoring systems are crucial across various industries, including the chemical, pharmaceutical, and textile sectors. They help maintain precise liquid levels and stable temperatures—factors essential to ensuring product quality.
4 mins
October 2025

Electronics For You
LAPTOP-BASED HMI For DC Motor Speed And Direction Control
DC motors are usually controlled with switches or buttons for direction and a potentiometer for speed.
3 mins
October 2025

Electronics For You
Internet Of Things: RUNNING LANGUAGE MODELS On Edge Devices
Let's delve into the technical aspects, challenges, and benefits of deploying language models on edge/loT devices.
8 mins
October 2025

Electronics For You
IOT GATEWAYS: A Layer Between IoT Devices And Cloud
In large-scale IoT setup scenarios, it is difficult to send data from IoT devices directly to the cloud as the network environment is not always connected to the internet, and protocols besides TCP/IP may govern IoT device operations.
4 mins
October 2025

Electronics For You
GST 2.0: Why India's Electronics Sector Welcomes It And Awaits A Festive Boost
GST 2.0 spans electronics, EVs, drones, and renewables, offering lower costs, clearer policies, and simpler compliance. Its success depends on how rapidly the gains flow through, aligning India's industry with global tax frameworks.
5 mins
October 2025

Electronics For You
Think That USB Port's JUST FOR CHARGING? Think Again.
Low battery. No outlet. That public USB port looks like a lifeline-but it could be a hacker's keyboard in disguise. Enter choicejacking-a next-generation cyberattack that hijacks our phone without permission. No taps. No clues. Just stolen access. If we care about our data, we must not plug in until we know what that charger is really doing.
4 mins
October 2025

Electronics For You
"Smart Manufacturing Rests On Three Pillars: PROCESS, TECHNOLOGY, And PEOPLE"
Driven by rapid innovation and rising expectations, the electronics industry stands at the crossroads of smart manufacturing, digital transformation, and sustainability. How do these go hand in hand? Delving deep, Prashant Kumkar from Tata Technologies broke down this transition at the EFY Expo in Pune.
5 mins
October 2025

Electronics For You
Reducing AI's Dependence ON POWERFUL GPUs
The quest is on, to reduce Al's over-dependence on power-hungry and expensive GPUs, to make it more affordable, accessible, and sustainable.
13 mins
October 2025
Listen
Translate
Change font size