They discover how they can hack your mobile phone charger

BadPower They discover how they can hack your mobile phone charger

Computer security researchers have discovered a new way to hack mobile chargers. A finding that is of great concern to the technology industry, but above all, to users who use these devices every day.

In the case of needing charge our mobile, connecting to a public site is something that may be normal for us, but we must be more careful from now on.

Your mobile phone charger can be hacked

This conclusion was reached thanks to the report published by Tencent Security Xuanwu Lab, which reveals the new type of security problem, is known as Bad Power.

This is a new form of attack that affects fast charging devices. When invaded, these chargers can generate excessive voltage when supplying power, resulting in damage to connected device components and even can cause fires.

This type of attack, Bad Power, represents a security risk for the physical environment in which the mobile is located. It is important to be Pay attention to the origin of chargers in public places and take steps to prevent these types of attacks to begin with.

How is it possible to hack your mobile phone charger

A malicious hacker can manipulate the block that powers the charging of our mobile, sending more energy than the smartphone can handle, overheating it and damaging internal components.

One of the examples of this practice that the Xuanwu Lab exposed is the following:

  1. The attacker uses a special device or malicious software to connect to public charging port, computer or any other device that needs charging.
  2. Once connected, invades the internal firmware of the charger and manipulates it using the attack Bad Power.
  3. Having transformed the charging device into an attack agent, it is only a matter of time before the targeted user Plug in your device and immediately receive the overload.

Security advice

One of the things that charger manufacturers have to work on is taking the necessary measures updating the firmware of their teams. The latent problem remains in equipment already sold or that is on the market before knowing about this vulnerability.

To start, we can take some measures to avoid encountering a BadPower attack and these are some of the things to keep in mind:

  • Make sure when purchasing fast charging devices that manufacturers offer firmware updates to national standards related to the technology.
  • Avoid sharing chargers, power banks, among others, with strangers.
  • Do not use an interface cable USB Type C to connect a fast charging device to another that does not support it. Fast charging devices supply higher current and voltage.
  • When connecting devices that support fast charging, check the input voltage and current to confirm that they are within the allowable range.

The Xuanwu Laboratory is working together with manufacturers to solve the problem and take the necessary measures. Research is still being done and trying to find the best solutions.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Actualidad Blog
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.