USB charger as hacking tool?

Interesting news about main topics from real world
Post Reply
Posts: 23
Joined: Sun May 15, 2016 11:06 pm

USB charger as hacking tool?

Post by maerg » Tue May 31, 2016 9:46 pm

Interesting... ... ogger.html

Rather check yours chargers... and keyboards, otherwise our hacking secrets are not secure anymore ;)

User avatar
Posts: 20
Joined: Sun Sep 25, 2016 8:07 am

Re: USB charger as hacking tool?

Post by fozza » Sun Sep 25, 2016 2:41 pm

Wow, interesting. Imagine if your charger this whole time had been tracking you, weird :shock:
Check out my website!

Posts: 4
Joined: Fri Sep 30, 2016 5:27 pm

Re: USB charger as hacking tool?

Post by Penumbruh » Fri Sep 30, 2016 5:30 pm

Does this affect mobile phones and the like as well or just wireless keyboards? And I saw some mention of the tech being outdated, any clue as to how this can be made modern tech and how to prevent against it?

Posts: 2
Joined: Sun Oct 23, 2016 2:34 am

Re: USB charger as hacking tool?

Post by Helionmike » Sun Oct 23, 2016 8:06 pm

Simple, it won't affect cell phones, (digital encryption) and bluetooth devices (single connection, won't allow dual connections on a device) and anything that has any encryption set up at all. In order for it to work on those it would have to send all info of the encryption over, and it's puny memory would not be able to hold it all to send.

Posts: 46
Joined: Wed Nov 30, 2016 12:56 pm

Re: USB charger as hacking tool?

Post by SxSnipeR » Wed Nov 30, 2016 1:16 pm

There are some chargers you can buy from ebay from China which contain microchips that install Stealth software on your phone which keylogs it. Always best to buy legit chargers even though it costs more.

User avatar
Posts: 30
Joined: Thu Feb 16, 2017 12:37 pm
Location: Chicago

Re: USB charger as hacking tool?

Post by graceinc » Wed Feb 22, 2017 2:01 pm

Long time back i heard, this news was from India where the government imposed a ban on Chinese made smartphones and cellphones as they suspected it had chips installed for tracking and hacking purposes. Don't have the link to the article at the moment.

Post Reply