Charging like this is dangerous and can steal all the information from your phone in minutes!

A phone charge and your personal information is checked all over?

Today's talk about this type of charging

It can seriously compromise your privacy.

Includes private photos, address book information, files, etc.

It can even remotely control your phone for consumption

Some public charging post facilities now have mobile phones that not only charge for free, but also for an unlimited amount of time. Yet there is something fishy in this free charging post: the After mobile phone users connected to the charging station, their private photos were surprisingly accessed by others, and even their bank cards were spent by others to buy movie tickets.

△Unauthorized elements use charging posts to remotely manipulate chargers' phones

Police analysis: uncovering the principle of charging post invasion

The charging station will prompt the user to enable USB debugging or trust the device

User clicks agree to make some of the phone's permissions open

(The key point of intrusion is that we allow access to external devices)

(Android phone △USB debugging function open carefully)

Take Android phones as an example, in fact, all smartphones have "USB debugging mode". With the help of a debugging tool on your computer, you can control your phone by running commands. Similar to the difference between programming language and speaking, you feel like just tapping the screen while using your phone, the same way a hacker can do all the operations through code commands.

When the phone is connected to the charging station's data cable, what is connected behind it may be a computer with a phone debugging tool, and the hacker can easily take away the control of the phone by just tapping the appropriate command code.

Apple Phone Interface

While the closed iOS is much firmer compared to the open-source Android, it's not completely risk-free. Trusted computers can sync with iOS devices, create backups, and access photos, videos, contacts, and other content on the device. Conversely if a computer is not trusted, it is blocked from accessing the content on your device.

There are also external storage devices on the market today with Lightning ports that can read content from photo apps if you choose to trust the device, so a phone charging station can do something like that.

Behind the Free Charge

All smartphones currently have a unified charging and data port, which means that when you connect the cable to your phone's charging station, you don't know whether you're connected to a charging head or a computer's USB port.

Some public charging stations will induce mobile phone users to turn on USB debugging, which effectively gives the phone's internal permissions to the other party entirely.

Once clicked on, computers, charging pads, etc. can be connected to the phone to secretly install phone software, or even malicious programs, for the person charging without consent.

In this way, the payment account, password, ID card information, contact information, photos and other private information in the consumer's mobile phone may be maliciously accessed by unscrupulous elements, which in turn can steal the mobile phone user's bank card.

It's a bit like hiding a person in an ATM, you deposit money into it and he counts it, but the hacking technique of using a mobile phone charging station as a cover is much more sophisticated than that. On the surface you think you're just charging, but behind the scenes your photos have been stolen by the charging station, and hackers can also take control of your phone to send text messages and even get verification codes to hack into payment apps.

In fact, it's not just charging stations that have the potential to be hacked into phones and steal information when connected to a charge. Even if you don't have a wired connection, hackers can break into your phone just as well. Check out this video below.

In the era of mobile Internet, people often use mobile devices for communication, exchange and financial transactions, so it is even more important to use them carefully to avoid leaking information.

Police Reminder

1. When a phone accesses a mobile phone charging station, if the charging station requires a permission request, it is always denied. (including USB debugging and device trust)

2. Some of the cell phone charging posts have outlets provided to charge with the devices you carry with you.

3. Some mobile phone charging posts only provide USB holes, if you encounter such mobile phone charging posts, please use a charging cable with charging function only (no data transfer function).

4. Turn the device off when using the cell phone charging station.

5. Be sure to have antivirus software installed on your phone. Install antivirus software on your phone and perform regular antivirus to avoid Trojan attacks.

6. Free WIFI in public places is likely to be used by hackers to commit illegal crimes, such as the use of free public WIFI, do not operate on the phone login password and other information to avoid leaks.

7. Carry a rechargeable battery with you and try not to use a public charging station.

A glimpse of the development of the Second Light Hospital in Hailun

1、HUAWEImate10 Lycra Dual Camera Full Screen AI Intelligence
2、Li Xiaolai Stages Blockchain Industrial Park Personally Performs the Biggest Joke in the Cryptocurrency Circle
3、SCP Usage Tips Recursive Exclusion Files
4、Chinese hacker Six Dao controls 200000 broilers to mine Monroe coins
5、If you have money in your phone turn this off Its not too late to watch

    已推荐到看一看 和朋友分享想法
    最多200字,当前共 发送