中國爆發大量共享充電寶竊取個資與監控的案例

2025-07-30

2025年7月30日,中國爆出一起引發廣泛關注的資安事件:不法詐騙集團通過改造共享充電寶,實施大規模個資竊取與監控行為。

根據多方媒體與警方通報,該犯罪行為涉及在市面上的共享充電寶設備中加裝特殊硬體與植入惡意程式碼,利用民眾在公共場所充電的需求,在不知不覺中竊取手機中的大量敏感資料,包括聯絡人、照片、社交媒體帳號、支付憑證,甚至可遠端操控手機鏡頭與麥克風,進行竊聽與偷拍。更令人震驚的是,即使手機已與充電寶斷開連接,相關間諜程式依然可在背景持續運作,手機形同被「植入監控芯片」,用戶毫無察覺。

這場資安危機的關鍵在於詐騙集團所採用的幾項精密竊密手法。首先,他們透過對充電寶的硬體改造,於裝置內部加裝微型晶片,藉由使用者插入手機充電的瞬間,迅速建立數據傳輸通道,在極短時間內讀取並攫取手機內部的核心資訊。這些晶片在外觀上極難識別,往往藏於普通電路板之下,難以被用戶察覺。

其次,該集團還透過權限誘導的方式,利用多數用戶對手機低電量的焦慮心理,在插入充電寶後彈出「是否信任此裝置」、「是否允許USB調試」等提示,誘導用戶在未審慎判斷下點選「允許」,一旦授權,即等同於將手機主動交給對方完全控制。

除了硬體與授權誘導之外,充電寶中還可能預先植入間諜軟體或木馬病毒。這些惡意程式一旦進入手機,即便使用者已斷開連接,程式依然可在系統後台潛伏運行,並定時上傳數據至遠端伺服器,使手機變成行動監控器。尤其是某些低安全級別的安卓系統手機,更易受到此類攻擊。此外,不法分子還會透過對充電寶後台系統中收集的使用者位置數據與行為模式進行大數據分析,針對特定族群,如企業高管、公職人員、記者等,進行監控與行蹤追蹤,潛藏極大國安與隱私風險。

對於此類新型態資訊安全威脅,資安專家呼籲民眾務必提高警覺。使用共享充電寶時應選擇知名品牌與官方授權設備,避免接觸來路不明或外觀異常的充電裝置。在手機連接充電寶時,若彈出授權提示,應詳加判斷並盡量拒絕不必要的權限申請。若在充電後出現手機發熱異常、操作卡頓、電量異常流失等現象,應即時使用手機安全程式進行病毒掃描,或考慮備份資料後恢復出廠設定。

在機密場域或涉密工作環境中,更應嚴格禁止使用任何共享充電寶,並確保所有智慧終端裝置不儲存或處理敏感信息。唯有強化個人與機構的資訊安全意識,才能在科技便利與個資風險之間取得穩妥平衡。

On July 30, 2025, a major cybersecurity incident in China drew widespread attention, as a fraudulent syndicate was discovered modifying shared power banks to steal personal data and remotely monitor users’ phones.

According to reports from media and law enforcement agencies, criminal groups had tampered with widely available shared power banks by installing specialized hardware and embedding malicious software. These altered devices were used to steal sensitive data such as contacts, personal photos, social media accounts, and payment credentials from users’ phones during charging. More alarmingly, the malicious programs could continue to operate even after the phone was disconnected, allowing hackers to remotely access the camera and microphone, effectively turning the phone into a surveillance device without the user’s knowledge.

The core of this security breach lies in the sophisticated methods employed by the fraudsters. First, through hardware modifications, they embedded microchips inside the power banks. Once a user plugged in their phone, a hidden data channel was immediately established, allowing the chip to extract critical personal information within seconds. These chips were cleverly concealed within the internal circuitry, making them virtually undetectable from the outside.

 

Secondly, the scheme relied on permission manipulation. Knowing that most users are anxious about low battery levels, the attackers designed pop-up prompts—such as “Trust this device” or “Allow USB debugging”—to appear during charging. Unsuspecting users, in a rush to power their devices, often clicked “Allow” without understanding the consequences, inadvertently granting full access to their smartphones.

Beyond hardware and permission tricks, the power banks were often preloaded with spyware or trojan malware. Once these malicious programs infiltrated the device, they continued running silently in the background—even after the phone was unplugged. Data was periodically sent to remote servers, effectively transforming the phone into a real-time monitoring tool. This kind of attack proved especially effective on smartphones with weaker security defenses, particularly outdated Android systems.

Moreover, the attackers conducted data mining by analyzing user behavior, geolocation data, and usage patterns collected via the power bank’s backend systems. This enabled them to track the movements and activities of specific high-risk groups, including corporate executives, government officials, and journalists—raising serious national security and privacy concerns.

In response to these emerging threats, cybersecurity experts have urged the public to exercise caution when using shared power banks. Users are advised to choose devices from reputable brands and avoid any that appear suspicious or modified. When prompted with authorization requests during charging, it is important to deny any unnecessary permissions. If users notice abnormal behavior—such as overheating, lagging performance, or excessive battery drain—after using a public charger, they should immediately scan for malware or consider backing up their data and performing a full factory reset.

For individuals working in sensitive environments, the use of shared power banks should be strictly prohibited, and all smart devices should be configured to avoid storing or handling classified information. Only by strengthening both personal awareness and institutional safeguards can we strike a responsible balance between technological convenience and data security.