Here's how hackers could turn your beloved vape against you

vape pen
(Image credit: Shutterstock / A McCormack)

The vape pen could become the latest tool in the cybercriminal arsenal, experts have suggested.

A report from EDGE Vaping, which manufactures e-cigarettes and refill cartridges, claims it’s feasible that hackers could modify vape devices to house malware, with the aim of infecting personal computers.

Although many people charge their vapes at the wall, others use the USB ports on their laptop or desktop PC, creating an opportunity for infection.

TechRadar needs you!

We're looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn't take more than 60 seconds of your time. Thank you for taking part.

>> Click here to start the survey in a new window <<

Unlikely, but possible

As standard, vape devices ship with only a tiny amount of on-board storage, which is insufficient to house typical malware strains. The famous WannaCry malware, for example, is said to be roughly 100 times larger than the storage capacity of the average e-cigarette.

However, EDGE Vaping says it would be possible for a hacker to introduce an additional chip to a vape device that increases the storage capacity, without altering the form factor in such a way that the owner might notice.

This notion was supported by security expert Ross Bevington, who confirmed it would be possible for a cybercriminal to introduce code that disguises a vape pen as a traditional computer peripheral, such as a keyboard.

Bevington was also eager, however, to play down the likelihood of such an attack, which he described as a fringe scenario. “Realistically, you should worry more about running dodgy software and ensuring your machine is up to date with the latest software updates,” he said.

But nonetheless, EDGE Vaping says the opportunity to turn a device as innocuous as a vape pen into a vehicle for malware or ransomware should act as a reminder that caution is always required when plugging a device of any sort into a personal device.

“People need to be aware of the risks involved when connecting unknown devices to their computer,” said Mike Williams, Head of IT at EDGE Vaping. 

“Whilst it should be highlighted that the threat level of hackers using a vape pen to access personal files is low, one can instil good practices to maintain safety with electronic devices. Be sure to use trusted devices and software, and only buy vape pens from reputable sellers.”

Presumably, Williams includes his own company in that bracket…

Joel Khalili
News and Features Editor

Joel Khalili is the News and Features Editor at TechRadar Pro, covering cybersecurity, data privacy, cloud, AI, blockchain, internet infrastructure, 5G, data storage and computing. He's responsible for curating our news content, as well as commissioning and producing features on the technologies that are transforming the way the world does business.

Read more
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Criminals are using a virtual hard disk image file to host and distribute dangerous malware
An iPhone sitting on a wooden table
Millions at risk as malicious PDF files designed to steal your data are flooding SMS inboxes - how to stay safe
Robotic hand clicking on captcha &#039;I am not a robot&#039;.
Fake CAPTCHAs are being used to spread malware - and we only have ourselves to blame
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Apple users facing new security risks after critical USB component hacked
malware
Google warns of legit VPN apps being used to infect devices with malware
A digital representation of a lock
Security experts are being targeted with fake malware discoveries
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras