Open_Source_Enjoyer I don't want to seem as if I'm claiming that no threats exist due to USB peripherals. Clearly that's not true, and the GrapheneOS developers have made changes to make those attacks harder.
But, to go over the articles you provided:
Open_Source_Enjoyer https://www.msn.com/en-us/news/technology/a-malicious-charging-cable-reveals-why-its-best-to-stick-to-official-accessories/ar-AA1wW9O0
No specific attacks are described. That is, nothing says "Windows/Debian/Ubuntu/macOS version X was exploited with this cable by ____". Some of the vague statements are pretty inapplicable to GrapheneOS phones. Sure, a malicious USB cable could contain a keystroke logger for USB keyboards... but that wouldn't capture PINs or passphrases entered via a phone touchscreen, so...
That article describes no actual exploit against anything, let alone any phone, let alone an Android phone, let alone an exploit that would somehow work against all Android phones without knowing which version is in use.
Open_Source_Enjoyer https://www.businessinsider.com/fbi-free-phone-charging-stations-could-get-hacked-malware-warning-2023-4?international=true&r=US&IR=T
I remember the "airport USB charging station" outcry. I also remember it being debunked (source source). Are there any reported instances of any actual devices being exploited via a free USB charging station?
Open_Source_Enjoyer https://www.nbcnews.com/tech/security/juice-jacking-why-you-should-avoid-public-phone-charging-stations-n1132046
Here a specific attack is described: remote mirroring of an iPhone screen. And there is even some video, though it is edited so that a key point is obscured. At least in this YouTube video, attaching an exterior monitor requires agreeing to a pop-up. If "cybersecurity expert Jim Stickley" has a way around that, that would be big news... and I suspect Apple would rush out a fix.
But screen mirroring has nothing to do with "installing a malicious app and giving the app admin permission" (Open_Source_Enjoyer) at all, let alone "very fast and in the background, without the user recognising it and having a chance to stop it" (Open_Source_Enjoyer).
Open_Source_Enjoyer https://www.techspot.com/news/105863-usb-c-cable-can-hide-lot-malicious-hardware.html
Again, "could easily contain hardware that can inject malicious code, log keystrokes, and extract personal data", no specific documentation of any specific exploit, just a "could" allegation.
https://counterespionage.com/malicious-usb-cables/
There is a video on this page, but it's a video of using infrared and voltage/amperage devices to discover cables with clandestine active elements. No demonstration of instant background installation of malware.
The original post made specific claims:
- getting passwords, pictures, documents and other stuff
- install a malicious app and give the app admin permission
- permanent backdoor access
- very fast and in the background, without the user recognising it and having a chance to stop it.
Note that "very fast and in the background" is the opposite of "user must agree to a pop-up about trusting a device".
Is it possible to provide documentation (such as a video) of #1, #2, #3, and/or #4 applying to, for example, an Android phone where PINs and passphrases are entered via the touchscreen?
Is it possible to provide a link to the article cited in the original post? If not, why is that not possible?