Public Charging Stations: How Hackers Steal Your Data—and Ways to Stay Safe

Les stations de recharge publiques, de plus en plus présentes dans les lieux fréquentés, peuvent devenir des points d’accès pour des cybercriminels cherchant à dérober vos informations personnelles. Voici ce qu’il faut savoir pour éviter ces attaques lors du rechargement de vos appareils.
Tl;dr
Rising Threats at Public Charging Stations
Anyone who’s ever plugged their smartphone into a public charging port—perhaps in an airport or a bustling shopping centre—might want to pause before doing so again. Recent research has uncovered that seemingly innocuous public chargers can be weaponized, enabling attackers to pilfer data from unsuspecting users’ devices. The emerging technique, sometimes referred to as juice jacking, exploits vulnerabilities in the connection between device and charger, making it far more than a mere theoretical risk.
The Evolution of Juice Jacking Attacks
Efforts by major tech players have been ongoing for years to contain these threats. For over a decade, Apple and Google have actively bolstered device security against the manipulation of USB connections. Yet, a recent breakthrough by researchers at the Graz University of Technology in Austria revealed that existing defenses are not impenetrable. Their study demonstrated that sophisticated attacks can circumvent earlier protections, allowing for the extraction of sensitive files—photos, documents—from both iOS and Android systems.
The Rise of ChoiceJacking—and Industry Responses
A new attack vector called ChoiceJacking has drawn particular concern from security experts. In response, both Apple and Google rolled out key updates: following the Austrian researchers’ publication, Apple released iOS 18.4, which now prompts users for authentication—via PIN or password—before permitting any interaction with a locked iPhone connected through USB. Meanwhile, Google’s latest release of Android 15 extends this layer of defense to Pixel phones and other compatible Android models.
Yet here’s the rub: despite these advancements, many widely used Android devices remain exposed. Delays in rolling out updates—or their absence altogether from some manufacturers—continue to leave millions at risk.
Protecting Your Device: Practical Steps
So what can users actually do? Several elements explain effective personal protection:
While all iPhones receive timely updates simultaneously, Android’s fragmented ecosystem often leaves some phones behind. If you’re using an older or less mainstream model, vigilance is doubly important.
In short, as attackers grow more creative and public chargers proliferate, the safest path is still relying on your own accessories. Adopting simple habits today could spare you significant headaches tomorrow—because if there’s one thing this research underscores, it’s that the threat is anything but hypothetical.