Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Wireless Charger Attack Boils Phone & Injects Commands

admin by admin
Feb 22, 2024
in News
A A
0

Threat actors target wireless chargers for multiple malicious activities, such as implanting malware or conducting power-related attacks.

The rising popularity of wireless charging brings convenience. Still, recent research by Zihao Zhan, Yirui Yang, Haoqi Shan, Hanqiu Wang, Yier Jin, and Shuo Wang from the University of Florida and CertiK uncovered vulnerabilities. 

They discovered that electromagnetic interference can manipulate the chargers, which poses security risks.

Researchers discovered VoltSchemer, which enables the execution of innovative attacks on wireless chargers by tweaking power supply voltage without any modification. 

Threats include voice assistant manipulation, device damage, and Qi-standard bypass.

VoltSchemer Wireless Charger Attack

VoltSchemer attacks exploit newly found wireless charger vulnerabilities that allow complete control via intentional electromagnetic interference (IEMI). 

By manipulating the magnetic fields, the threat actors gain control of voice assistants and initiate harmful power transfers.

Document

Analyse Shopisticated Malware with ANY.RUN

More than 300,000 analysts use ANY.RUN is a malware analysis sandbox worldwide. Join the community to conduct in-depth investigations into the top threats and collect detailed reports on their behavior..


However, cybersecurity analysts identified the widespread vulnerability and risks after testing the same on 9 top-selling chargers.

Wireless Charging System (Source – Arxiv)

Wireless charging uses near-field magnetic coupling and transfers power without direct connections, which prevents data access by threat actors. 

The Qi standards ensure safety and device protection. Its benefits, like enhanced security, which simplified the charging and reduced mess, drive its rapid market growth. 

Wireless chargers are now everywhere, as they have already been deployed widely in airports, restaurants, and more.

Wireless charging differs significantly from wired charging by eliminating physical connections, which helps reduce the attack surfaces. 

The Qi standards ensure robust communication and safety by employing the following techniques for data integrity:-

  • Amplitude-Shift Keying (ASK)
  • Biphase Mark Coding (BMC)
Attack overview (Source – Arxiv)

According to the report, real-world power adapters vary from ideal performance due to workload behaviors affecting the switching regulator’s limitations.

Circuit model (Source – Arxiv)

Attack Vectors

Here below, we have mentioned the attack vectors:-

  • Voice Injection
  • Qi Message Injection
  • Qi Message Eavesdropping

Researchers assess system resilience by testing the voice command injection on iPhone SE and Pixel 3 XL across various chargers. 

While the success depends on factors like system electrical characteristics, voice signal features, and assistant algorithms. 

Finding the minimum interference depth for efficient and stealthy attacks, observations show charging interruptions increase beyond 0.35, which shows the accuracy in threshold measurements.

Testing wireless power-toasting attacks on Samsung Galaxy S8 shows that the smartphone protection measures are compromised.

Overheated phone (Source – Arxiv)

Voltage interference corrupts the power-halting attempts by misleading the charger and maintaining dangerously high temperatures despite protective measures, stabilizing at 178°F.

Three wireless charger manipulation methods (Source – Arxiv)

To counter the attacks, researchers recommended integrating noise suppression components like extra DC/DC converters, which is practical. 

Testing on a Renesas P9242 charger shows significant noise reduction across frequencies, with a minimum of 15 dB. However, this solution increases cost, size, weight, failure rate, power consumption, and thermal stress.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are extremely harmful, can wreak havoc, and damage your network.

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.