You are at the airport, your phone is at 12%, and there is a free USB charging station right next to your gate. You plug in without thinking twice. But that charging port may be doing more than delivering power to your battery -- it could be stealing your data, installing malware, or giving an attacker remote access to your device. This threat is called juice jacking, and it is real enough that the FCC has issued official warnings about it.
What Is Juice Jacking?
Juice jacking is a cyberattack in which criminals tamper with public USB charging stations or leave behind compromised USB cables to exploit the fact that USB connections carry both power and data simultaneously. When you plug your phone into a compromised port, the attacker can:
- Steal data: Copy contacts, photos, messages, emails, saved passwords, banking information, and authentication tokens directly from your device
- Install malware: Silently load spyware, keyloggers, or ransomware onto your phone that continues operating long after you unplug
- Lock your device: Deploy ransomware that locks you out of your phone entirely until you pay a fee
- Establish persistent access: Install a backdoor that gives the attacker ongoing remote access to your device, even after you leave the compromised charging station behind
The attack works because the USB standard was designed for both data transfer and power delivery over the same connection. When you plug into a wall outlet with your own charger, only electrical power flows. When you plug into a USB port, data pins are active -- and that is the opening attackers exploit.
The FCC's Official Warning
The Federal Communications Commission has explicitly warned consumers to avoid using free USB charging stations in airports, hotels, and shopping centers. The FCC advises travelers to carry their own charger and USB cable and to use an electrical outlet instead. When a federal agency issues a specific warning about a threat, it is worth taking seriously.
The New Threat: ChoiceJacking
Traditional juice jacking relied on exploiting older devices that did not prompt the user before allowing data access over USB. Modern smartphones addressed this by adding a trust prompt -- on iPhone, you see "Trust This Computer?" and on Android, you must approve a USB debugging connection. This was supposed to make juice jacking obsolete. It did not.
In 2026, researchers demonstrated a new attack called ChoiceJacking that defeats these trust prompts entirely. Here is how it works:
- You plug your device into a compromised USB port
- The malicious hardware targets the millisecond window between when your device connects and when the security prompt renders on screen
- It floods your device's input queue with simulated affirmative clicks -- essentially pressing "Trust" or "Allow" before you even see the question
- By the time the prompt appears (if it appears at all), the device has already granted data access
ChoiceJacking is effective because it exploits the tiny gap between connection and prompt display. Your phone's security dialog cannot protect you if the answer has already been submitted before you see the question. This technique has been demonstrated against both iOS and Android devices, making it a universal concern.
Trust Prompts Alone Are No Longer Enough
If your security strategy for public charging is "I will just tap Don't Trust when prompted," you need to update your thinking. ChoiceJacking can bypass trust dialogs by injecting input before the prompt even renders. The only reliable protection is to prevent untrusted USB data connections entirely -- either by using your own charger with a wall outlet, carrying a power bank, or using a USB data blocker.
Where Juice Jacking Happens
Juice jacking attacks are most commonly associated with high-traffic public locations where people are likely to have low batteries and limited options:
- Airports and train stations: Long travel days drain batteries, and charging stations are everywhere in terminals
- Hotels: Bedside USB ports built into hotel furniture and alarm clocks are convenient -- and potentially compromised
- Shopping malls: Free charging kiosks in common areas attract dozens of users per day
- Conference centers: Events often provide charging stations for attendees, and large conferences are high-value targets for data theft
- Coffee shops and restaurants: USB ports built into tables and booths are increasingly common
- Rental cars: USB ports in rental vehicles could theoretically be compromised, particularly in rideshare or fleet vehicles
8 Ways to Protect Yourself
1. Use Your Own Charger With a Wall Outlet
The simplest and most effective defense. Carry your own charging cable and power adapter, and plug into a standard AC electrical outlet rather than a USB port. Electrical outlets deliver power only -- there is no data channel to exploit. This one habit eliminates juice jacking risk entirely.
2. Carry a Portable Power Bank
A portable battery pack means you never need to rely on public charging infrastructure. Modern power banks are compact, affordable, and can fully charge a smartphone multiple times. Charge your power bank at home and keep it in your bag whenever you travel.
3. Use a USB Data Blocker
USB data blockers -- sometimes called "USB condoms" -- are small adapters that sit between your cable and the USB port. They physically disconnect the data pins while allowing power to flow normally. They cost between five and fifteen dollars and are small enough to keep on your keychain. This is the best option if you absolutely must use a public USB port.
4. Respond Correctly to Trust Prompts
On iPhone, if you see a "Trust This Computer?" dialog when plugging into what should be a simple charger, tap Don't Trust immediately. On Android, if a USB debugging or file transfer prompt appears, deny it. While ChoiceJacking can bypass these prompts in some cases, properly responding still provides a layer of defense against older and less sophisticated attacks.
5. Disable USB Debugging on Android
If you are an Android user, go to Settings, then Developer Options, and ensure USB debugging is turned off. If Developer Options is not visible in your settings, that means it is already disabled -- leave it that way. When you do connect your Android device to a USB port, select "Charge only" mode if prompted. This limits the connection to power delivery.
6. Enable USB Restricted Mode on iPhone
iOS includes a feature called USB Restricted Mode that prevents the Lightning or USB-C port from being used for data transfer if your iPhone has not been unlocked in the past hour. Go to Settings, then Face ID and Passcode (or Touch ID and Passcode), scroll down, and ensure "USB Accessories" is toggled off. This means USB accessories will not be allowed to connect when your iPhone has been locked for more than an hour.
7. Keep Your Devices Updated
Apple, Google, and device manufacturers regularly patch USB-related vulnerabilities. Every operating system update you skip is a known vulnerability you are leaving open. Enable automatic updates on all your devices and install them promptly. The patches that close juice jacking attack vectors are often included in routine security updates without fanfare.
8. Know What to Do If You Suspect Compromise
If you plugged into a public USB port and your device behaved unexpectedly -- unusual prompts, brief screen flickers, unfamiliar apps appearing, or sudden battery drain after disconnecting -- take these steps immediately:
- Disconnect from the USB port immediately
- Run a full malware scan using a reputable mobile security app
- Change passwords for your most sensitive accounts -- email, banking, and any accounts with saved login credentials on your phone
- Enable two-factor authentication on all critical accounts if you have not already
- Monitor your financial accounts and credit reports for unauthorized activity
- Check your installed apps for anything you do not recognize and remove it
Protect the Data That Matters Most
Juice jacking is one of many ways your personal information can be compromised. Even if you never plug into a public USB port, your personal data -- name, address, phone number, email -- is likely already exposed across dozens of data broker websites, making you a target for phishing, identity theft, and social engineering attacks. PrivacyOn removes your personal information from over 100 data brokers and continuously monitors for new exposure, reducing the amount of data available to anyone who would target you -- whether through a compromised charging station or any other method.
Good digital security is about layers. Carry your own charger. Use a power bank. Keep your software updated. And make sure the personal data that fuels targeted attacks is not sitting in the open for anyone to find.