When your phone is dying and your flight is delayed, the nearest USB charging station feels like a lifeline. But this everyday convenience carries hidden dangers.
Juice jacking, a cyberattack that leverages public USB ports to steal data or install malware, has grown concerning enough that the TSA and FCC have issued warnings. Business travelers, often carrying sensitive data and corporate credentials, are especially at risk.
“Hackers can install malware at USB ports (we’ve been told that’s called ‘juice/port jacking’). So, when you’re at an airport, do not plug your phone directly into a USB port,” the TSA recently warned.
Juice jacking occurs when a modified USB port or cable transfers malicious code or extracts data while delivering power. Because USB connections also transmit data, a tampered port can silently install spyware, ransomware, or keyloggers on your device, or siphon off contact lists, emails, credentials, and even access to cloud accounts. The device appears to charge normally, leaving the user unaware of the breach.
According to the FCC, while there are no verified public cases, the threat is real enough to merit caution.
“Malware installed through a corrupted USB port can lock a device or export personal data and passwords directly to the perpetrator,” the FCC states. “Criminals can then use that information to access online accounts or sell it to other bad actors.”
Business travelers are uniquely vulnerable to juice jacking:
According to a report by IBM Security, the average cost of a corporate data breach is $4.88 million. A single compromised device due to juice jacking could serve as a vector into a corporate network, leading to widespread loss.
Compromised ports look identical to normal ones. Some attackers may leave infected cables behind or attach devices that are nearly invisible to the average traveler. Even experts admit that spotting a tampered port with the naked eye is almost impossible. Devices may behave normally while malware installs in the background.
The FBI's Denver office has also issued public warnings about juice jacking, emphasizing that attackers may use compromised USB ports to push malware that harvests sensitive business or personal data.
Juice jacking isn’t limited to airports. Be cautious in:
Each of these venues sees high daily foot traffic and frequently offers unsupervised USB access.
Juice jacking may not yet be widespread, but it represents a real threat, especially to business travelers. With awareness and simple precautions, individuals and companies can protect data and reduce the risk of attack. When it comes to airport charging, always think before you plug in—your data could depend on it.
► You’ll also like: Your rights when flights go wrong: New airline refund rules
We’ve curated some articles to keep you updated on all things Christopherson Business Travel.