ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

Juice Jacking is an attack in which malicious chargers compromise connected mobile devices. Shortly after the attack was discovered about a decade ago, mobile OSs introduced user prompts for confirming data connections from a USB host to a mobile device. Since the introduction of this countermeasure, no new USB-based attacks with comparable impact have been found.

In this paper, we present a novel family of USB-based attacks on mobile devices, ChoiceJacking, which is the first to bypass existing Juice Jacking mitigations. We observe that these mitigations assume that an attacker cannot inject input events while establishing a data connection. However, we show that this assumption does not hold in practice. We present a platform-agnostic attack principle and three concrete attack techniques for Android and iOS that allow a malicious charger to autonomously spoof user input to enable its own data connection. Our evaluation using a custom cheap malicious charger design reveals an alarming state of USB security on mobile platforms. Despite vendor customizations in USB stacks, ChoiceJacking attacks gain access to sensitive user files (pictures, documents, app data) on all tested devices from 8 vendors including the top 6 by market share. For two vendors, our attacks allow file extraction from locked devices. For stealthily performing attacks that require an unlocked device, we use a power line side-channel to detect suitable moments, i.e., when the user does not notice visual artifacts.

We responsibly disclosed all findings to affected vendors. All but one (including Google, Samsung, Xiaomi, and Apple) acknowledged our attacks and are in the process of integrating mitigations.
Original languageEnglish
Title of host publicationUsenix Security Symposium 2025
Publication statusAccepted/In press - 2025
Event34th USENIX Security Symposium: USENIX Security 2025 - Seattle, United States
Duration: 13 Aug 202515 Aug 2025
Conference number: 34
https://www.usenix.org/conference/usenixsecurity25

Conference

Conference34th USENIX Security Symposium
Abbreviated titleUSENIX'25
Country/TerritoryUnited States
CitySeattle
Period13/08/2515/08/25
Internet address

Keywords

  • Mobile Security

Fingerprint

Dive into the research topics of 'ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago'. Together they form a unique fingerprint.
  • SEIZE - Secure Edge Devices For Industrial Zero-Trust Environments

    Mangard, S. (Co-Investigator (CoI))

    1/01/2231/12/24

    Project: Research project

  • A-SIT - Secure Information Technology Center Austria

    Stranacher, K. (Co-Investigator (CoI)), Dominikus, S. (Co-Investigator (CoI)), Leitold, H. (Co-Investigator (CoI)), Marsalek, A. (Co-Investigator (CoI)), Teufl, P. (Co-Investigator (CoI)), Bauer, W. (Co-Investigator (CoI)), Aigner, M. J. (Co-Investigator (CoI)), Rössler, T. (Co-Investigator (CoI)), Neuherz, E. (Co-Investigator (CoI)), Dietrich, K. (Co-Investigator (CoI)), Zefferer, T. (Co-Investigator (CoI)), Mangard, S. (Co-Investigator (CoI)), Payer, U. (Co-Investigator (CoI)), Orthacker, C. (Co-Investigator (CoI)), Lipp, P. (Co-Investigator (CoI)), Reiter, A. (Co-Investigator (CoI)), Knall, T. (Co-Investigator (CoI)), Bratko, H. (Co-Investigator (CoI)), Bonato, M. (Co-Investigator (CoI)), Suzic, B. (Co-Investigator (CoI)), Zwattendorfer, B. (Co-Investigator (CoI)), Kreuzhuber, S. (Co-Investigator (CoI)), Oswald, M. E. (Co-Investigator (CoI)), Tauber, A. (Co-Investigator (CoI)), Posch, R. (Principal Investigator (PI)), Bratko, D. (Co-Investigator (CoI)), Feichtner, J. (Co-Investigator (CoI)), Ivkovic, M. (Co-Investigator (CoI)), Reimair, F. (Co-Investigator (CoI)), Wolkerstorfer, J. (Co-Investigator (CoI)) & Scheibelhofer, K. (Co-Investigator (CoI))

    21/05/9931/12/24

    Project: Research area

Cite this