The Cyber Crime of Juice Jacking in Developing Economies: Susceptibilities, Consequences and Control Measures
##plugins.themes.bootstrap3.article.main##
It is convenient and the norm to have both data and power cables (battery charge) integrated as a single Universal Serial Bus (USB) cable for today’s mobile devices. While the data component of the cables serves as the channels for data communication, the power channel charges the mobile devices through an adapter connected to an Alternating Current (A/C) socket or directly to a USB port. This convenient and seemingly harmless design could also serve as a medium through which malicious hacks are carried out on the connected mobile devices as studies and recent experimentations has shown. This hacking variant called Juice Jacking now serve as a potential avenue for mobile device exploitation, especially in developing economies where poor power grid infrastructures has allowed for indiscretions in charging devices from any available. This paper formulates a simple architecture for Juice Jacking cyber-crime, review prove-of-concept experimentation for Juice Jacking from available literatures, identifies significant threats and levels of impact of this cyber-crime on the community. It also highlights strategies that could mitigate juice jacking in developing economies.
References
-
R. Hill, “Dealing with Cyber Security Threats: International Cooperation, ITU and WCIT, 7th International Conference on Cyber Conflict: Architectures in Cyberspace, 2015, NATO CCD COE Publications, 2015.
Google Scholar
1
-
K. Sharma, Juice Jacking - How it Happens & Safety Measures | REVE Antivirus, REVE Antivirus, 2018. [Online]. Available: https://www.reveantivirus.com/blog/en/juice-jacking. [Accessed: 03- Jul- 2021].
Google Scholar
2
-
S. Kabanda, M. Tanner and C. Kent, “Exploring SME cybersecurity practices in developing countries,” Journal of Organizational Computing and Electronic Commerce 28:3, 269-282, 2018.
Google Scholar
3
-
Z. Whittaker, LA warns of ‘juice-jacking’ malware, but admits it has no cases, Techcrunch.com, 2019. [Online]. Available: https://techcrunch.com/2019/11/15/los-angeles-juice-jacking-usb/. [Accessed: 04- May- 2021].
Google Scholar
4
-
M. Charboneau, How to Avoid 'Juice Jacking' and Keep Your Data Safe While Traveling, Men's Journal, 2020. [Online]. Available: https://www.mensjournal.com/travel/juice-jacking-usb-port-malware-privacy-data-protection/. [Accessed: 04- May- 2021].
Google Scholar
5
-
C. Crane, Juice Jacking: How Hackers Can Steal Your Info When You Charge Devices – Hashed Out by The SSL Store™, Hashed Out by The SSL Store™, 2020. [Online]. Available: https://www.thesslstore.com/blog/juice-jacking-usb-how-hackers-can-steal-your-info-when-you-charge-devices/. [Accessed: 04- Jun- 2021].
Google Scholar
6
-
“Juice Jacking History - Juice-Jacking Foundation”, Juice-Jacking Foundation, 2021. [Online]. Available: https://juicejacking.org/juice-jacking-history/#_ftn19. [Accessed: 04- May- 2021].
Google Scholar
7
-
“Technical Juice Jacking – Juice-Jacking Foundation”, Juice-Jacking Foundation, 2021. [Online]. Available: https://juicejacking.org/technical-juice-jacking/. [Accessed: 04- May- 2021].
Google Scholar
8
-
S. Peswani, What is Juice Jacking and how to prevent it & protect your smartphone, The Windows Club, 2018. [Online]. Available: https://www.thewindowsclub.com/juice-jacking-prevent-protect-device. [Accessed: 02- Jul- 2021].
Google Scholar
9
-
D. Balaban, The Ins And Outs Of Juice Jacking Attacks | Information Security Buzz, Information Security Buzz, 2020. [Online]. Available: https://informationsecuritybuzz.com/articles/the-ins-and-outs-of-juice-jacking-attacks/. [Accessed: 04- May- 2021].
Google Scholar
10
-
“Nigeria – eCommerce”, International Trade Administration | Trade.gov, 2020. [Online]. Available: https://www.trade.gov /knowledge-product/nigeria-ecommerce. [Accessed: 02- Jul- 2021].
Google Scholar
11
-
M. Elgan, Is Juice Jacking a Legitimate Threat or Nothing to Worry About?, Security Intelligence, 2020. [Online]. Available: https://securityintelligence.com/articles/is-juice-jacking-a-legitimate-threat-or-nothing-to-worry-about/. [Accessed: 04- Jun- 2021].
Google Scholar
12
-
“Juice jacking – Wikipedia”, En.wikipedia.org, 2021. [Online]. Available: https://en.wikipedia.org/wiki/Juice_jacking. [Accessed: 04- Jun- 2021].
Google Scholar
13
-
A. Greenberg, The Unpatchable Malware That Infects USBs Is Now on the Loose, 2014. [Online]. Available: https://www.wired.com /2014/10/ code-published-for-unfixable-usb-attack/. [Accessed: 04- Jul- 2021].
Google Scholar
14
-
R. Lei, A Short History of Juice Jacking, Secjuice, 2019. [Online]. Available: https://www.secjuice.com/history-of-juice-jacking/. [Accessed: 02- May- 2021].
Google Scholar
15
-
L. Fitzgibbons, What is juice jacking? - Definition from WhatIs.com, SearchSecurity, 2020. [Online]. Available: https://searchsecurity. techtarget.com/definition/juice-jacking. [Accessed: 04- Jun- 2021].
Google Scholar
16
-
M. Potuck, How to prevent juice jacking on iPhone and what is it? - 9to5Mac, 9to5Mac, 2020. [Online]. Available: https://9to5mac. com/2020 /03/12/prevent-juice-jacking-iphone/. [Accessed: 04- Jun- 2021].
Google Scholar
17
-
P. Arntz, Explained: juice jacking – Malwarebytes Labs, Mal warebytes Labs, 2020. [Online]. Available: https://blog.malw arebytes. com/explained/2019/11/explained-juice-jacking/. [Accessed: 04- Jun- 2021].
Google Scholar
18
-
“The Hidden Privacy Risk of USB Charging Stations”, Spread Privacy, 2020. [Online]. Available: https://spreadprivacy .com/privacy-risks-usb-charging/. [Accessed: 04- Apr- 2021].
Google Scholar
19
-
N. Goud, Beware of Juice Jacking Cyber Attack – Cybersecurity Insiders, Cybersecurity Insiders, 2020. [Online]. Available: https://www.cybersecurity-insiders.com/beware-of-juice-jacking-cyber-attack/. [Accessed: 04- Apr- 2021].
Google Scholar
20