Categories: NewsTech

BadPower: This fast-charging hack can set your smartphone on fire

We’ve all heard the myth that smartphones can spontaneously catch on fire, which is why many choose not to charge their smartphones by their bedsides at night. Regardless of whether that is true or not (it’s not, to my knowledge), a new hack has been discovered that could bring those terrifying nightmares to life. According to a new report from Tencent-owned Xuanwu Labs, the BadPower hack tricks fast charging power bricks into setting a connected smartphone on fire.

It must be noted that only fast charge power adapters are seemingly affected by the hack—which is still worrying, given the increasing amount of fast chargers in the market today. The report doesn’t specifically point towards any particular brands or phones, although 35 power bricks from various manufacturers were tested.

Wait, so how does BadPower work?

The BadPower hack works by corrupting the charging adapter’s firmware, which is then tricked into pushing too much electricity that might be over the phone’s rated maximum input. This then leads to a buildup in heat, which then leads to melted components—and yes, phones literally catching on fire.

While there are a variety of fast charging protocols from various manufacturers nowadays, the basic principle is the same. The power brick and accompanying smartphone, when connected, perform a “handshake” of sorts to determine the speeds that the smartphone can handle. This is the very reason why it is still considered safe to connect a smartphone that can only handle regular charging speeds like 10W to a power adapter that can theoretically charge at up to 30W.

SOURCE

However, when the firmware is hacked, the power brick can be manipulated into damaging phones that are connected. Unlike many security vulnerabilities today, BadPower doesn’t actually compromise your privacy—but phones catching on fire are certainly equally dangerous.

So, how do you avoid the BadPower hack?

Fortunately, it appears that a BadPower attack can only be initiated in person. This means that a special device—usually disguised as a smartphone—must be connected to the charger to initiate the corrupted firmware. Additionally, attackers can also connect an infected smartphone of their own to a power adapter, which then corrupts its firmware.

According to the report, there are 234 fast charging devices in the market today, although only 35 were tested during the study. More than half of these chargers were found to be vulnerable to BadPower, with 18 models from 8 different tech brands at risk.

The fix to the issue? It’s pretty simple: upgrade the firmware of your power brick. However, not every charging adapter supports firmware updates—which means that those adapters are as good as gone, basically.

To protect power adapters in the future, researchers are also advising manufacturers to ad technical requirements for safety verification for firmware updates. Other safeguards such as an overvoltage protection circuit are advised, along with chip fuses for non-fast charging.

To read the full report (in Chinese), click here.

[ SOURCE ]

Recent Posts

MCMC urges iPhone users to update iOS immediately following “Darksword” exploit

The Malaysian Communications and Multimedia Commission (MCMC) has urged iPhone users to update their devices…

3 hours ago

Tesla turns on SuperChargers at Toppen Shopping Centre in Johor Bahru

Ahead of the Raya holiday weekend, Tesla Malaysia has just turned on a new SuperCharger…

1 day ago

OMOWAY: The Tesla of 2-Wheelers Is Charting Its Course With OMO X and Mobility One Wheeled Robot

This post is brought to you by OMOWAY. The production of OMO X, the world’s…

1 day ago

BMW i3: Fully electric 3 Series, 800V EV with up to 900km range and 400kW DC charging

BMW has unveiled the new BMW i3, its first fully electric 3 Series for the…

2 days ago

Poco X8 Pro: Flagship-class performance and up to 8,500mAh battery for under RM2,000

The Poco X8 Pro and X8 Pro Max have officially launched and they are now…

3 days ago

This website uses cookies.