This ordinary-looking lightning cable has stolen all your data

Picture of the article titled

Screenshot: Lucas Lopek/Hak5

Here are some Mr. Robot-A level conspiracy that suits you: Imagine a USB-to-Lightning cable that looks harmless, once plugged into your machine, it can actually help hackers steal all data From your iPhone and inject malware into your device. If this sounds like something from a far-fetched TV show, then surprisingly, it is actually one thing.

motherboard Recently written About such a tricky little product, sold by a cyber security company Hack 5 And named “OMG Cable” after its inventor, Security Researcher MGThis cable looks almost exactly the same as the Apple Lightning data cable. It is sold in USB-C or USB-A format and is equipped with a hidden chip that allows users to remotely steal data or deploy malware to MacBook, iPad, and iPhone.This product was previously Web conference D2019 EFCON, Is used as a penetration testing tool, as a deputy report.

How it works: Once plugged in, OMG will basically set up a wifi hotspot, and then remote users can connect to the hotspot. From there, the online interface that comes with the product allows hackers to record and record activity from the target device. According to Hak5, the keylogger recorded up to 650,000 keystrokes. The company described it as “built for concealed on-site use, with enhanced remote execution, stealth, forensic evasion capabilities, and the ability to quickly change your tools.”

There are plenty of videos on YouTube to guide you through how the whole process works. For example, here is an article by technology video blogger David Bombal:

Of course, you can imagine some very evil scenarios involving this product. For spies who want to hack you, all they really need to do is wait for you to go to the bathroom in a coffee shop, and then quietly replace your actual Lightning cable with OMG. From there, all your data can be returned to their own server with a little remote skill.

Although the geographic range of its function is limited, it obviously can work at a considerable distance. “We tested this in downtown Oakland and were able to trigger the payload at more than 1 mile,” MG told Motherboard.

Yes, impressive, but not bad. In short: protect your ports and ensure security there.

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *