Essayer OR - Gratuit

Think That USB Port's JUST FOR CHARGING? Think Again.

Electronics For You

|

October 2025

Low battery. No outlet. That public USB port looks like a lifeline-but it could be a hacker's keyboard in disguise. Enter choicejacking-a next-generation cyberattack that hijacks our phone without permission. No taps. No clues. Just stolen access. If we care about our data, we must not plug in until we know what that charger is really doing.

- AKANKSHA SONDHI GAUR

Think That USB Port's JUST FOR CHARGING? Think Again.

Ever used a public charging station at an airport, coffee shop, or hotel? We have all been there—low battery, no outlet in sight, and that USB port seems like a lifeline. But what if that innocent-looking charger could hijack our phone—in less time than it takes to blink?

Welcome to the world of choicejacking—a stealthy, next-generation cyberattack that has security researchers sounding alarms. Unlike old-school juice jacking that required us to click something or fall for a fake app, choicejacking needs nothing from us at all. That is what makes it so dangerous. Let us unpack what it is, how it works, and why—if we care about our data—we should never trust a public USB port again.

What exactly is choicejacking

Let us start with a scenario. We plug our phone into a free USB port to charge. Normally, a prompt appears: “Allow this device to access your data?” We tap No and remain safe. With choicejacking, that prompt flashes for a microsecond—and the charger has already tapped Yes. Silent access in under 133 milliseconds—faster than our eyes can blink.

Choicejacking is the latest evolution in USB-based cyberattacks, discovered by a team of researchers from Graz University of Technology in Austria. Unlike earlier attacks that required malware or questionable apps, this one spoofs our own inputs—sending fake touch or keyboard commands to trick our phone into thinking we gave permission. The charger pretends to be us. This new kind of cyberattack exploits human interface device (HID) emulation—the same USB protocols we use daily to test hardware or connect peripherals are being turned against us.

Under the hood: How the attack works

When we plug into a malicious charger, we are not just drawing power. That charger can double up as:

• A USB host

• A spoofed keyboard or touchscreen (HID)

• A seemingly harmless power source

PLUS D'HISTOIRES DE Electronics For You

Electronics For You

Electronics For You

5 Interesting Reference Designs For WEARABLE ELECTRONICS

Build wearables faster with sensors, Bluetooth, and extended battery life-powered by ready-to-use reference designs.

time to read

3 mins

October 2025

Electronics For You

Electronics For You

Delay-Off APPLIANCE TIMER

This delay-off timer is a cost-effective, reliable, and easy-to-assemble device for automating time-based switching operations.

time to read

3 mins

October 2025

Electronics For You

Electronics For You

WATER LEVEL And TEMPERATURE MONITOR With TFT Graphics Using Arduino

Water and temperature monitoring systems are crucial across various industries, including the chemical, pharmaceutical, and textile sectors. They help maintain precise liquid levels and stable temperatures—factors essential to ensuring product quality.

time to read

4 mins

October 2025

Electronics For You

Electronics For You

LAPTOP-BASED HMI For DC Motor Speed And Direction Control

DC motors are usually controlled with switches or buttons for direction and a potentiometer for speed.

time to read

3 mins

October 2025

Electronics For You

Electronics For You

Internet Of Things: RUNNING LANGUAGE MODELS On Edge Devices

Let's delve into the technical aspects, challenges, and benefits of deploying language models on edge/loT devices.

time to read

8 mins

October 2025

Electronics For You

Electronics For You

IOT GATEWAYS: A Layer Between IoT Devices And Cloud

In large-scale IoT setup scenarios, it is difficult to send data from IoT devices directly to the cloud as the network environment is not always connected to the internet, and protocols besides TCP/IP may govern IoT device operations.

time to read

4 mins

October 2025

Electronics For You

Electronics For You

GST 2.0: Why India's Electronics Sector Welcomes It And Awaits A Festive Boost

GST 2.0 spans electronics, EVs, drones, and renewables, offering lower costs, clearer policies, and simpler compliance. Its success depends on how rapidly the gains flow through, aligning India's industry with global tax frameworks.

time to read

5 mins

October 2025

Electronics For You

Electronics For You

Think That USB Port's JUST FOR CHARGING? Think Again.

Low battery. No outlet. That public USB port looks like a lifeline-but it could be a hacker's keyboard in disguise. Enter choicejacking-a next-generation cyberattack that hijacks our phone without permission. No taps. No clues. Just stolen access. If we care about our data, we must not plug in until we know what that charger is really doing.

time to read

4 mins

October 2025

Electronics For You

Electronics For You

"Smart Manufacturing Rests On Three Pillars: PROCESS, TECHNOLOGY, And PEOPLE"

Driven by rapid innovation and rising expectations, the electronics industry stands at the crossroads of smart manufacturing, digital transformation, and sustainability. How do these go hand in hand? Delving deep, Prashant Kumkar from Tata Technologies broke down this transition at the EFY Expo in Pune.

time to read

5 mins

October 2025

Electronics For You

Electronics For You

Reducing AI's Dependence ON POWERFUL GPUs

The quest is on, to reduce Al's over-dependence on power-hungry and expensive GPUs, to make it more affordable, accessible, and sustainable.

time to read

13 mins

October 2025

Listen

Translate

Share

-
+

Change font size