Major Smartphones Vulnerable to Hacking Threat Called “Video Jacking” – Cyber Security Firm Reports
Hacked: Hacking Finance

Cybersecurity

Video Jacking: Major Smartphones Vulnerable to Hacking Threat

Posted on .

Video Jacking: Major Smartphones Vulnerable to Hacking Threat

Introduction

This article was posted on Wednesday, 22:26, UTC.

Major smartphones – the iPhone, Samsung Galaxy phones and Google’s Nexus phones – are vulnerable to the hacking threat called “video jacking”, when plugged into public charging stations, this according to cyber security company Aries Security.

// -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- //

“From the moment that you plug in that cable to the moment that you unplug, that cable is exposed and recorded,” Brian Markus, CEO of Aries Security, told CNBC.

The CEO of Aries Security describes video jacking this way, “When you connect to your contacts, all of that is recorded. If you do an e-mail or a text, everything on the screen is 100 percent recorded.”

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

How does video jacking work?

According to Markus, video jacking happens when an iPhone, Samsung Galaxy phone or Google phone is charged in a rigged public charging station. Hackers, he said, can compromise a public charging station by attaching an HDMI cable.

An HDMI cable is a widely available smartphone accessory that allows images from a phone to be projected onto a TV screen.

Once a smartphone is plugged into a charging station with a hidden HDMI cable, hackers could secretly record a video and record everything you do on your phone.

// -- Get exclusive consultation for as low as $249 per month on MoneyMakers.com -- //

With the HDMI cable, Markus said, “There’s no security prompting asking the user if they’re sure that they want to allow this to go out.”

Dangers of Using Public Charging Stations

In May this year, cyber security company Kaspersky Lab warned about the dangers of charging mobile phones in public charging stations.

“Smartphones can be compromised when charged using a standard USB connection…,” Kaspersky said in a statement.

In the blog post entitled “Charging your smartphone’s battery over USB can be dangerous,” Kaspersky researcher Alexey Komarov wrote, “USB ports were designed not just to provide charge, but also to transfer data. So whenever a mobile device is connected to a USB port, it attempts a handshake, during which it transmits some data.”

He added, “On average, it takes more than 100 kilobytes of data just to tell the host system about the phone’s files and folders — for reference, that’s about the size of Alice in Wonderland e-book.”

In a 2013 paper called “Mactans: Injecting Malware into iOS Devices via Malicious Chargers,” researchers led by Billy Lau found that iOS devices can be compromised in just one minute after being plugged into a malicious charger.

To demonstrate the vulnerability of iOS devices, Lau and his associates built a malicious charger called Mactans, using a BeagleBoard.

“While Mactans was built with a limited amount of time and a small budget, we also briefly consider what more motivated, well-funded adversaries could accomplish,” Lau and his associates wrote.

In another paper called “Charge Your Device with the Latest Malware” published in 2014, researchers led by André Pereira highlighted the dangers of Android smartphones of physical attacks using the USB.

Mobile phone attacks through USB can be accomplished through the use of public fake charging stations, Pereira and his associates wrote. They added, “USB connection is a threat that should not be overlooked.”

So the next time you are on the road and your mobile phone battery is slowly dying on you, do not be tempted to charge into that nearest public charging station.

To prevent possible attacks through unknown charging points, Kaspersky advises smartphone users to exercise the following:
• Use only trusted USB charging points
• Protect your mobile phone with a password, or with another method such as fingerprint authentication, and never unlock it while charging
• Use encryption technologies and secure containers

Better yet, bring your own charger. This way, you are sure that you are out of harm’s way.

Image from iStock/xrrr.

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.



Feedback or Requests?

Ellen Red

Ellen Red

There are no comments.

View Comments (0) ...
Navigation
The team:
Dmitriy Lavrov
Analyst
Dmitriy Lavrov is a professional trader, technical analyst and money manager with 10 years of trading experience. He covers Forex, Commodities and Cryptocurrencies. He is among the top 10 most Read More
Jonas Borchgrevink
Founder
Jonas Borchgrevink is the founder of Hacked.com and CryptoCoinsNews.com. He is a serial entrepreneur, trader and investor. He shares his own personal journey on Hacked.com. // -- Discuss and ask Read More
P.H. Madore
ICO Analyst
P. H. Madore lives in Arkansas with his wife and children. He has covered the cryptocurrency beat over the course of hundreds of articles for Hacked’s sister site, CryptoCoinsNews, as Read More
Mate Csar
Analyst
Trader and financial analyst, with 10 years of experience in the field. An expert in technical analysis and risk management, but also an avid practitioner of value investment and passive Read More
Justin O’Connell
Journalist
Justin O’Connell is a cryptocurrency journalist who works have appeared in the U.S.’s third largest weekly, the San Diego Reader & VICE. // -- Discuss and ask questions in our community Read More
Mati Greenspan
Analyst
Senior Market Analyst at Etoro.com. // -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- // Important: Never invest Read More
Rakesh Upadhyay
Analyst
Rakesh Upadhyay is a Technical Analyst and Portfolio Consultant for The Summit Group. He has more than a decade of experience as a private trader. His philosophy is to use Read More
Pamela Meropiali
Account Manager
Pamela Meropiali is responsible for users on Hacked.com. // -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- // Read More
Joseph Young
Journalist
Joseph Young is a finance and tech journalist & analyst based in Hong Kong. He has worked with leading media and news agencies in the technology and finance industries, offering Read More
An insurance platform based on the blockchain. That’s what those…