How To Hack A Phone Charger

We live in an age where malware targets smartphones and other Internet of Things (IoT) .

Of course, hackers look for other ways to exploit attacks, choosing different "paths". Recently, this has focused on chargers that can attack a smartphone until it melts or burns.

Introduction to the "bad power" attack

The have recently managed to compromise a wide variety of chargers with malicious code and supply more voltage than the connected device could handle. With this approach, the overload caused a spark, and the devices components burned.

The attack is known as bad power. It works by changing the default parameters in of the charger.

Figure 1: Ordinary fast chargers, potentially vulnerable to this attack

Let's understand a little how fast chargers work. It may look like a regular charger, but it is made with special hardware. The charger hardware can communicate with the connected device to determine a charging speed based on the capabilities of the device. Also remember that each device has its own characteristics and power speed.

In this sense, if the destination device does not support fast charging function, the fast charger provides the standard power - 5V. On the other hand, if it accepts larger charging inputs, the charger can use 12V, 20V or even higher charging speeds. This is the crucial point where a bad power attack can be exploited.

The bad power attack destroys the charger hardware. The operation changes the default charging parameters on the hardware and increases the voltage to a number that the charger cannot handle. This unusual behavior leads to dramatic scenarios.

The following video is a demonstration of this technique by Tencent Security Lab, in order to show us how a bad power attack destroys our device.

The Tencent research team tested the bad power attack on 35 fast chargers from 234 models available on the market. So 18 models from 8 different suppliers were vulnerable to this attack.

The worst case scenario happens with some chargers from certain vendors. The power attack can be fixed in simple chargers by updating the device's hardware, but the researchers said 18 chip vendors do not have any s hardware. In this case, there is no way to fix the vulnerability on these devices.

In this respect, the defect is considered critical and without a quick and effective solution.

Be careful with your device

One of the peculiarities of this attack is that with one simple step you can destroy any device: connect it to the right fast charger. In the worst case scenario, the attack can damage the device in just a few minutes .

Figure 2: H device is damaged when connected to a "malicious" fast charger.

According to the researchers, "with some fast chargers, intruders do not even need the hardware. They can load the attack code to modify the hardware on the target smartphone or laptop. "When a victim connects their infected smartphone or laptop to a fast charger, the device could catch fire."

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).