This wireless charger cyberattack could literally set your phone on fire

Cooked salmon on the ninja woodfire
(Image credit: Future / Helen McCue)

New research published by researchers at the University of Florida and Web3 security audit company CertiK has revealed a new form of cyberattack that could set your smartphone on fire via its wireless charger.

The terrifying academic paper claims to have uncovered vulnerabilities in the way wireless chargers are manufactured, exposing them to ‘intentional electromagnetic interference’ (IEMI) from threat actors.

A set of cyberattacks christened by the authors as VoltSchemer allows for inaudible voice commands to be sent remotely and control the target device’s voice assistant, overcharging of batteries and overheating of a device itself, and even damage nearby items close to the wireless chargers, such as USB sticks, car fobs and SSDs inside laptops.

VoltSchemer in simple terms

Researchers tested nine best-selling wireless chargers from brands like Anker and Phillips, and found security vulnerabilities in all of them while using two test devices: Apple’s iPhone SE and Google’s Pixel 3 XL.

Essentially, these attacks are made possible by reading the input voltage of a charger and then manipulating it. Voltage manipulation doesn’t require a hardware or software modification to either the charger or software to work, just putting a device purpose-built to do that between the two, making VoltSchemer especially dangerous.

Some of this genuinely seems like black magic. For instance, by carefully manipulating the electromagnetic interference depth, the researchers could inject voice commands that are inaudible to human ears but understood by the smartphone’s microphone and voice assistant without interrupting power transfer from a wireless charging pad.

Scorching devices, or ‘Wireless Power Toasting’ as the researchers call it, is achieved by injecting electrical interference into the supply voltage: giving attackers control over the voltage passed between charger and smartphone

While the latest smartphones are able to terminate the charging process and shut down apps as well as the device itself in case of overheating, researchers were able to use electrical interference to disrupt communication between the smartphones and chargers in testing.

And perhaps the most impressive attack, Foreign Object Destruction, involves tricking the wireless charger, via packet injection, that it itself is a device capable of wireless charging - allowing for it to transfer power without a compatible smartphone present, to any metallic device nearby. 

Researchers were able to finagle their way past various checks and balances to then adjust the power transfer rate beyond safe levels. 

It’s at this point that we get to the real science: melting expensive stuff. Per the paper, data on SSDs and USB drives, documents affixed to paper clips, and RFID-tagged passports and other NFC-enabled devices were all destroyed at temperatures up to 536F/280C, with the researchers noting that, in daily use, it’s very easy to accidentally place items like these on a charging pad.

VoltSchemer’s implications

Fascinating stuff and pretty dangerous stuff all round, then, but should we be worried? Well, that’s hard to answer with a simple ‘yes’ or ‘no’.

VoltSchemer may be multifaceted and covert, but it’s not the first set of wireless charging vulnerabilities: others have had names as grotesque as Wormheart and Parasite.

As the paper itself states, the point for concern should be that VoltSchemer is comparatively easier to set up than its predecessors: wireless chargers don’t require custom firmware unique to the manipulation attack method, or physical modification to the charger, through such means as placing adversarial coils on the pad which, beyond being cumbersome, makes the attack less stealthy.

However, the saving grace of this abomination is that it was devised by security researchers, publishing their findings for the benefit of keeping others safe. The researchers have included countermeasures, and disclosed their findings to relevant vendors. None of what they found is good, but the information should be in safe hands now.

The paper also makes clear that wired charging cables are prone to its own vulnerabilities. However, they too have to be modified, and plugging a device in physically is at least a deliberate act, so, if you’re getting paranoid, wires could be a safer bet.

Via BleepingComputer

More from TechRadar Pro

Luke Hughes
Staff Writer

 Luke Hughes holds the role of Staff Writer at TechRadar Pro, producing news, features and deals content across topics ranging from computing to cloud services, cybersecurity, data privacy and business software.

Read more
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Apple users facing new security risks after critical USB component hacked
Photograph of a hand holding a smartphone with two googly eyes
Every tap, every message – how to stop your smartphone spying on you
An iPhone sitting on a wooden table
Millions at risk as malicious PDF files designed to steal your data are flooding SMS inboxes - how to stay safe
Find My app logo displayed on an iPhone 11 screen
This Find My exploit lets hackers track any Bluetooth device – here’s how you can stay safe
Bluetooth
Top Bluetooth chip security flaw could put a billion devices at risk worldwide
A finger touching the google chrome icon in the Windows 10 start menu
A new Chrome browser highjacking attack could affect billions of users - here's how to fight it
Latest in Security
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Representational image depecting cybersecurity protection
GitLab has patched a host of worrying security issues
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
AI agents can be hijacked to write and send phishing attacks
China
Volt Typhoon threat group had access to American utility networks for the best part of a year
Abstract image of cyber security in action.
MassJacker malware targets those looking for pirated software
Latest in News
Google Pixel 8a in aloe green showing
Google Pixel 9a benchmark link teases the performance of the upcoming mid-ranger
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 17 (game #1148)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 17 (game #379)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 17 (game #645)
Apple iPhone 16 Pro HANDS ON
Leaked iPhone 17 dummy units may have given us our best look yet at all four models
A super close up image of the Google Gemini app in the Play Store
It's official: Google Assistant will be retired for phones this year, with Gemini taking over