Previous All Posts Next

Video Jacking: Phone Hacking via Screen Mirroring

Posted: August 11, 2016 to Cybersecurity.

Tags: Data Breach, Malware, Cloud Security

Hacking a Phone with Screen Mirroring

Video Jacking - Defined. Screen mirroring is a pretty underused feature on most smartphones. Essentially, it allows someone to cast a duplicate video from their phone’s screen to a larger screen like a television. Unfortunately, as it turns out, it’s also a pretty easy way to steal personal information and could potentially be set up in any public place, like an airport, where people need to get a quick phone charge.

Video Jacking

The technique is being called video jacking, and it can be carried out by hackers using a phony USB charging station. Once a victim plugs in, everything they do is recorded, including passwords, account numbers, text, emails, pictures, etc.

Similar to juice jacking where malicious charging stations steal user data, video jacking is easier to pull off and allows hackers a video replay of every touch of the screen and keystroke. Even if the device is protected with a passcode, as long as it’s plugged in, when the device is unlocked, the passcode will be recorded.

O.MG cables and Keystroke Injection Attacks

Unfortunately, it’s virtually impossible to tell a USB cord that only charges from one that has video capabilities. Additionally, phones don’t typically prompt users when video is being cast. The researchers behind this new technique only tested Android phones, but any HDMI ready phone, including iPhones, are potentially susceptible.

In most phones, HDMI access is turned on by default, so if you plug into a bad charging station, the phone connects automatically. If you are concerned about video jacking, you can check your phone’s settings to see if you can turn the feature off. However, the best way to avoid being a victim is to not use untrusted charging stations and carry your own charging cord when you travel.

Related Resources

Learn more about how Petronella Technology Group can help:

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Protect Your Business with Our Cybersecurity Services

Our proprietary 39-layer ZeroHack cybersecurity stack defends your organization 24/7.

Explore Cybersecurity Services
Previous All Posts Next
Free cybersecurity consultation available Schedule Now