Security Stop Press : Wireless Chargers Phone Hack & Fry Threat

Written by Pronetic

Pronetic is a leading provider of core IT support for ISO 27001, Cyber Essentials and Cyber Essentials Plus compliance.

March 13, 2024

Researchers from the University of Florida have reported how VoltSchemer, a set of attacks that exploit two commonly found features in commercial-off-the-shelf wireless chargers (COTS), can give attackers control over a phone then enable man-in-the middle attacks.

VoltSchemer attacks work by exploiting voltage noises from the power supply (electromagnetic interference) to manipulate wireless chargers without the need for any malicious modifications to the chargers themselves. The researchers were able to show how such attacks were successful on 9 top-selling wireless chargers and can also alter chargers to overheat and ‘fry’ phones.

Since these attacks rely on setting up a malicious power source in a specific location, the advice is to use your own personal charging port (e.g. the one at home) or your own portable charger/plug where possible.

You May Also Like…

0 Comments

Why Choose Pronetic

We Are ISO 27001 & Cyber Essentials Plus Certified

Be reassured that we have been externally audited. You can have complete peace of mind that the team managing your IT systems and safeguarding your data are independently vetted annually.

Seamless & Comprehensive IT Support

Our investment in people, tools and processes, continuously improved, ensures that we don’t just deliver exceptional I.T. support but include your compliance to Cyber Essentials or ISO 27001 “baked-in”. Yes, that means no more annual headaches and stress when your certification comes round.

Expert Support Money Back Guarantee

We're confident in the value we deliver. That's why we offer a 90-day, no-quibble money-back guarantee. If, for any reason, you're not completely satisfied with our IT support services, we'll provide a full refund and cancel your contract without any hassle.

Book Your Free IT Strategy Call Now!

Simply Fill In The Form Below To Receive Your Free IT Strategy Call:

By submitting this form, you consent to us using your personal information to contact you. For more information please see our privacy policy.