
Why You Should Never Plug Your Phone into Airport USB Chargers
By: Sarah Stone
Skip to Section
TSA has issued warnings about the cybersecurity risks of plugging your devices into public USB charging ports. Here’s why you should bring a battery pack or plug your phone into a non-USB power source next time you fly.
What Could Make Airport USB Ports Dangerous
The threat is called “juice jacking,” and it’s generally theoretical. The TSA hasn’t confirmed cases of juice jacking at airports as of August 2025, but should it become an issue in the future, here’s your primer.
Juice jacking sees cybercriminals install malware on public USB charging stations – once you plug in your phone, the compromised port can silently transmit malware or extract data from the device. When you plug your phone into a compromised port, the malware can capture text messages, contact lists, and even keystrokes from your device.
USB connectors have five pins, but only one is needed to charge a device, while two pins handle data transfer. This design means the same port that powers your phone can also access all its features. An infected public USB port can silently enable data transfer modes on your phone once connected, without any prompt or indication. That means a modified USB port or cable is enough for hackers to access your most sensitive information.
Juice jacking can happen in any public place that provides USB charging stations, including shopping centers, hotels, and cafes. You should also avoid public USB cables and chargers wherever you encounter them.
How Juice Jacking Works
Juice jacking is a hardware-focused man-in-the-middle attack where attackers use a USB connection to load malware directly onto charging stations or infect connection cables. Sometimes they leave infected cables plugged in, hoping someone will use the “forgotten” charger. Even worse: cheap USB-C chargers from vending machines and kiosks can be infected as well.
Once your phone is plugged in and charging, the hacker can download your files and information or monitor your keystrokes on the device. The data theft happens automatically and quickly – the amount of data an attacker can steal depends on how long you leave your device plugged into the compromised charging station. An attacker may be able to make a complete backup of your device if it’s plugged in long enough.
Once installed, malware can compromise device security, allowing unauthorized access, tracking of online activities, or complete control over the device.
What Hackers Can Steal From Your Phone
When your device gets compromised through juice jacking, here’s what you’re risking.
Personal information: Hackers can steal passwords, credit card information, addresses, names, and other personal data. Banking details, email access, and social media accounts all become vulnerable.
Complete device access: A disabling juice jacking attack locks the device owner out of their device, giving full access and control to the hacker. You might not be able to use your phone while criminals have complete control.
Ongoing surveillance: Attackers can install malware to track keystrokes, show ads, or add devices to a botnet. Your phone becomes a tool for further criminal activity without your knowledge.
Multi-device spread: Once your device is infected, it becomes a carrier designed to infect other USB ports, allowing cybercriminals to scale up their attacks and infect multiple devices simultaneously.
The Current Threat Level
As mentioned, there have been no confirmed juice jacking attacks at US airports as of August 2025.
However, the TSA has put out a warning this June for the millions of travelers passing through US airports every day, making the potential scale of exposure quite concerning. And researchers have found variations on juice jacking called ChoiceJacking that can bypass the basic protections Apple and Google built into their devices. The threat keeps getting more sophisticated, so cybersecurity experts and federal agencies aren’t waiting for widespread attacks to start warning people.
How to Protect Yourself While Traveling
Bring a personal power source: A fully charged power bank is a safe and convenient way to recharge devices on the go. This removes any risk of data transfer through compromised USB ports.
Use wall outlets only: Using a wall adapter eliminates the risk of data transfer posed by public USB ports. Standard electrical outlets can’t access your data – they only provide power.
Pack a USB data blocker: A USB data blocker is a barrier between your phone and a public USB port, allowing only power to flow through while blocking any data transfer. These small tools add protection between your device and the charging point.
Choose “charge only” when prompted: If you absolutely must use a USB port, when you plug in your phone, you’ll see a prompt asking if you want your data to sync or if you want to charge – always select the “charge only” option. For iPhones, choose “don’t trust” when asked about trusting the device.
Red Flags to Watch for
Your phone may start working unusually slowly or feel hotter than usual -you may have picked up malware. Other warning signs include unexpected apps appearing on your device, unusual data usage, or your battery draining faster than normal.
Knowing if a charging station has been tampered with is relatively difficult, as most cybercriminals will ensure it isn’t apparent that a charging station is unsafe. Since there are no foolproof visual signs, avoiding public USB ports entirely is your best protection.
If You Think You’re Compromised
If you notice unusual behavior on your device or suspect a charging port could be compromised, unplug your device immediately to stop any ongoing data transfer or malware installation.
Use reputable antivirus or anti-malware software to scan your device for malicious files. If you believe your login credentials may have been stolen, change passwords for important accounts immediately.
Enable multi-factor authentication on all critical accounts, especially email, banking, and work applications, which adds an extra layer of security even if passwords are compromised.
Think of USB data blockers and power banks as digital travel insurance. A few dollars spent on protection beats dealing with identity theft, compromised accounts, or a completely hijacked device.
Happy Travels!
About the Author
Featured image by Mike Winkler on Unsplash
Information published on this website and across our networks can change over time. Stories and recommendations reflect the subjective opinions of our writers. You should consult multiple sources to ensure you have the most current, safe, and correct details for your own research and plans.
Frayed Passport is a participant in the Amazon Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com. We also may share links to other affiliates and sponsors in articles across our website.