New USB cable type allows hackers to perform remote attacks
That's right, you don't look wrong, a scenario that seems to appear only in fictional movies has been officially applied to reality, which is the new USB cable, when plugged into the computer can give Allows an attacker to execute commands remotely via WiFi connection, as if they were directly using your computer keyboard!
Specifically, when plugged into a Linux, Mac, or Windows computer, this USB cable will be recognized by the operating system as HID or a normal user interface device. Because HID devices are considered input devices for an operating system, they can be used to enter commands as if the command is being typed directly on the keyboard without any difficulty.
- Malware and user security bugs are found in top free VPN applications
The father of this 'attack' cable is security researcher Mike Grover, who has a famous alias: _MG_. Structurally, it includes an integrated WiFi PCB, also created by Mike Grover himself. This WiFi chip allows an attacker to connect to a remote cable to execute commands on the computer or manipulate the mouse cursor on the system easily.
In a video demonstrating how to use this cable, Mike Grover just plugged the cable into the PC that was able to connect to it remotely and issue commands via the smartphone app quickly.
In an interview with BleepingComputer, this security researcher explained that when connected to a power source, the "attack" cable could be viewed as a keyboard and mouse emulator. This means an attacker can enter and execute commands regardless of whether the device is locked or not. Even more frightening, if your computer is usually set to session lock through the timer, the cable can still be configured to simulate user interaction to prevent this feature.
"This cable works like any keyboard and mouse on the lock screen, which means you can type and move like you would a normal mouse. So if you have access to the password If the target system relies on a timer to automatically lock the device, the attacker can still easily use this cable to deal with it. In general, users will find it hard to notice anything unusual (mouse movements, pointers, etc.) on their system, "Mike Grover said.
- Azorult Trojan steals user passwords while running in the background like Google Update
Wi-Fi attacks deauthentication may also occur
Although HID attacks can be prevented by using USB condoms, it is much more complex to resist data transfer between cable and computer and thus this method can be used. for WiFi (Wi-Fi deauthentication attack).
Wi-Fi deauthentication attack is a type of denial of service attack that targets communication between users and Wi-Fi wireless access points. In other words, this type of attack is used to disconnect nearby wireless devices from an access point by sending a confirmation frame from fake MAC addresses.
With the emergence of this new cable, a Wi-Fi deauthentication attack can be used in situations where hackers do not have access to a location to conduct attacks in the usual way, as long as the victim plugs the cable into their system. This could also allow an attacker to create a physical teleportation remotely, to distract a more dangerous remote attack from being executed.
- The Internet is experiencing a huge problem with C / C ++, causing developers to "sweat"
Can this cable be marketed?
Currently, this type of USB cable is still in the lab, but Mike Grover hopes it will soon be recognized and reach other security researchers in the future.
In a recent statement, Mike Grover said he spent more than $ 4,000 and about 300 hours of research to create the needed WiFi WiFi and attach them to the cable. Overall the finishing quality of the first products is relatively good. This is a complete DIY device and if produced on a large scale, the selling price will likely not be too high.
There is still a lot to do if Mike Grover wants to launch this product to the market!
You should read it
- What is CAT 6 network cable and how is it different from the CAT 5e network cable?
- With this fake Lightning cable, hackers can remotely take over your computer in minutes
- Ethernet cable and how it works
- How are APG and AAG cables different?
- These are the types of printer cables needed to connect to the computer
- 4 best USB-C cables 2019
- 13 unexpected facts about sea cable routes
- This unremarkable looking Lightning cable can steal your data and send it to hackers
- Distinguish common network cables
- Map of 420 Internet cables, stretching 1.1 million kilometers on the seabed around the world
- How to create an Ethernet crossover cable
- Build a network crossover cable
Maybe you are interested
AI can analyze radiation from HDMI cable signals to hack data on the screen
Why do marine fiber optic cables continuously break? How to repair fiber optic cable?
How to use app 1.1.1.1 to watch movies and play games when the cable breaks
The wrong way to charge your iPhone causes the charging cable tip to turn black
How to charge AirPods wirelessly or with a power cable
Special cable, only a few countries in the world can produce it