Security

BadPower attack could burn your device through fast charging

Researchers devised a technique dubbed BadPower to alter the firmware of fast chargers to cause damage to connected systems or cause the device to catch fire

Security researchers from Tencent have devised a technique, dubbed BadPower, to alter the firmware of fast chargers to cause damage to connected systems or cause the device to catch fire.

“Tencent Security Xuanwu Lab discovered a new type of safety problem in some fast charging (hereinafter referred to as fast charging) products and named it “BadPower”.” reads the post published by Tencent.

“Using BadPower, an attacker can hack into devices such as chargers that support fast charging technology, causing the intruded device to output an excessively high voltage when powering externally, resulting in breakdown and burning of the components of the powered device, and even further damage to the powered device. The physical environment where the equipment is located creates a safety hazard.”

Attackers can modify the firmware of a fast charger device to deliver an excessively high voltage that could cause severe damage to the connected equipment, even set devices on fire.

BadPower consists of corrupting the firmware of fast chargers.

Fast chargers can at least provide a maximum of 20V voltage and 100W power for charging devices in tens of minutes. They can even supply power to larger power devices, including laptops and desktop monitors. 

Upon connecting the power supply terminal and the power receiving terminal through the charging cable, they start to negotiate the charging power, based on the device’s capabilities. 

In case, a fast-charging feature is not supported, the fast charger delivers 5V by default. Experts noticed that by altering the code that controls the power supply behavior in the fast charging device, the fast charging device can input a maximum voltage of 20V to devices that can only accept 5V voltage, causing a power overload.

This technique was dubbed by the researchers BadPower, it consists of altering the default charging parameters to force the device into delivering higher voltage than cannot be handled by the device to charge.

The power overloading could damage the receiver’s components, as they heat up, or even burn.

The experts from the Xuanwu Lab tested the technique against several power receiving equipment to evaluate the potential effects of power overload caused by BadPower.

The researchers tested 35 out of 234 fast-charging devices in the market. At least 18 of them from 8 brands suffered BadPower problems. Among the 18 models, 11 models can be attacked through digital terminals that support fast charging.

Xuanwu Lab also investigated 34 fast-charging chip manufacturers and discovered that at least 18 chip manufacturers produce chips with the function of updating firmware after finished products. Attackers could exploit this function to conduct BadPower attack.

“A few power-receiving equipment with better overload protection can not be affected by BadPower power overload attack. However, in most cases, power overload will cause the relevant chips in the power receiving device to break down and burn out, causing irreversible physical damage.” continue the experts. “In rare cases, BadPower attacks may also affect the security of the physical environment around the device.”

Experts pointed out that the BadPower attack is stealth and fast, there is no way for the victims to detect it.

The researchers say the BadPower attack code can also be loaded on regular smartphones and laptops.

“Most BadPower problems can be fixed by updating the device firmware.” the researchers conclude. “Device manufacturers can take measures to repair the BadPower problems in the sold products according to the situation, for example, to help users update the firmware in the charging device through the maintenance network, or to issue security updates to mobile phones and other terminal devices that support fast charging technology through the network, and upgrade the charging The firmware in the device.”

Researchers also published a video PoC of the BadPower attack.

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, BadPower)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Kaiser Permanente data breach may have impacted 13.4 million patients

Healthcare service provider Kaiser Permanente disclosed a security breach that may impact 13.4 million individuals…

6 mins ago

Over 1,400 CrushFTP internet-facing servers vulnerable to CVE-2024-4040 bug

Over 1,400 CrushFTP internet-facing servers are vulnerable to attacks exploiting recently disclosed CVE-2024-4040 vulnerability. Over…

2 hours ago

Sweden’s liquor supply severely impacted by ransomware attack on logistics company

A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …

5 hours ago

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

15 hours ago

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

22 hours ago

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…

22 hours ago

This website uses cookies.