
Public chargers are becoming the next lure in the juice-jacking playbook, this time targeting your phone, your wallet, and – in edge cases – your car. Here’s what EV drivers need to do before plugging in.
EV charging is exploding, and, with it, a flurry of payment apps, QR codes, vendor backends and new car-to-charger protocols.
Researchers and agencies have been warning for years about “juice jacking” against phones via shady USB ports; threat actors are now adapting similar tricks around EV charging sites, most commonly with fake QR codes for payments and, sometimes, by abusing weaknesses in charger networks.
Some charging plazas still expose USB ports around kiosks or in lounges. Treat any third-party USB as hostile. If your phone prompts for “data access,” deny it. Better yet, use your own AC adapter or a power bank. Multiple government advisories now warn against public USBs for exactly this reason.
Safer choice: Use your own wall plug in a mains outlet or a data-blocking USB adapter.
The most common EV-specific scam is low-tech but effective: threat actors slap a sticker QR code over the real one. You scan, land on a convincing fake portal, enter card details or app credentials, and your money is gone. This pattern has been reported at parking meters and EV sites in multiple countries, and consumer groups have issued alerts.
Red flags to spot:
Charging networks rely on standards like the OCPP (charger <-> cloud) and ISO 15118 “Plug & Charge” (car <-> charger). Studies have documented risks: weak auth on some OCPP deployments and earlier ISO 15118 variants that allowed unencrypted sessions in certain scenarios (fixed in ISO 15118-20 with mandatory TLS 1.3). Practical car-hacking from a public charger is still a high-skill, low-frequency scenario, but the research tracks show why operators must harden systems.
Real-world signs that chargers can be compromised aren’t always subtle. Remember those UK chargers that were hacked to display explicit content? If vandalism is possible, tampering is just a step away.


Before you plug in to your next public charger, take two minutes to boost your digital defenses: run the QR or payment link through Scamio and make sure your devices and identity are covered by an all-in-one suite like Bitdefender Ultimate Security. It’s one of the smartest ways to charge with peace of mind.
Yes. It’s rare but still occurs in public USB ports. Most modern scams now target payment info via fake QR codes instead of skimming payment terminals. The core advice is the same: avoid public USB ports and use your own trusted power source.
Absolutely. A portable power bank acts as a physical barrier between your device and any potentially compromised charging port. Since your phone connects only to your own battery’s USB output, no data can be exchanged with an attacker-controlled port. It’s the simplest and most reliable way to stay safe when you need power on the go.
Yes. The FBI has repeatedly warned consumers to avoid public USB charging stations, especially in airports, hotels and shopping centers, because criminals can modify them to install malware or steal data. The bureau recommends carrying your own charger and plugging into an AC outlet instead.
If you mean your personal EV charger or portable cable, practical deterrents help:

Public chargers are essential infrastructure, and they’re attractive to scammers. The everyday risk today is payment fraud via fake QR codes and skimmers, while deeper charger/network exploits remain on the rare side, but under active study.
If you pay through official channels, avoid sticker QR codes, skip public USBs and keep firmware current, you’ll neutralize the vast majority of threats while keeping your road trips smooth.
tags
Vlad's love for technology and writing created rich soil for his interest in cybersecurity to sprout into a full-on passion. Before becoming a Security Analyst, he covered tech and security topics.
View all postsNovember 18, 2025
November 17, 2025
November 17, 2025