This unremarkable looking Lightning cable can steal your data and send it to hackers
The reason for saying that is because an international security researcher has recently successfully developed a Lightning cable that looks quite ordinary, or rather, is no different from a Lightning cable that comes with the iPhone, but it is not. possess the ability to steal passwords and remote kernel data from any target. The stolen data will then be sent to the hacker without the victim's knowledge.
This dangerous cable is called OMG, and it basically works like a normal Lightning cable. That is, it still supports users to charge the battery and transfer data, only there will be one more unwanted malicious 'feature', which is stealing data from the connected system.
Vice's report shows that it is difficult for users to detect the difference between this malicious OMG cable and Apple's regular Lightning, because they have too similar external designs. However, the real difference will lie on the inside, when the OMG cable is integrated with a rather complex chip system, which can record keystrokes as well as clicks and touches on the user's screen when connected. connects to MacBooks, iPads, and even iPhones. It then sends back data about a malicious agent that can live for miles away. This involves creating a WiFi hotspot that hackers can access, and then using the necessary tricks to steal data from the target device. For example, hackers can embed keylog software in the cable, which can continuously collect keystroke data of the target in real time.
And yet, this malicious Lightning cable also includes a geolocation feature that, when activated, can act as a blocker to the device's payload according to its location. This will help prevent accidental leakage of keystrokes from other devices. Furthermore, the cable also has the ability to change the keyboard mapping, as well as collect and build the identity of the USB device.
As mentioned, all of the above features are made possible thanks to a small chip placed inside the cable head. However, what makes OMG even more dangerous is that it looks very similar to a regular Lightning cable in both design and size. As you can see in the image above, the implanted chip takes up almost half of the space of the plastic shell, but still ensures the overall appearance of the cable and allows it to function properly. The video below shows how this malicious cable works.
Fortunately, the OMG cable is not intended to cause harm. It was developed by a security researcher nicknamed "MG", and serves as a penetration testing tool. This cable is now mass-produced and sold to cybersecurity supplier HaK5.
You should read it
- Apple reduced the price of USB-C cables to Lightning to $ 19
- We can still survive after being struck by lightning, why?
- Shocked the series of lightning strikes causing mass death
- What is lightning? Why is there lightning?
- Please download more than 50 lightning wallpapers, lightning wallpaper for computers
- How to use Photoshop CS5 - Part 26: Create a lightning effect
- What is USB Type-C, Lightning, which has a superior advantage?
- The longest lightning in the world reaches more than 320 km
May be interested
- New USB cable type allows hackers to perform remote attackswhen plugging in a linux, mac, or windows computer, this usb cable will be recognized by the operating system as hid or a normal user interface device ...
- 4 best USB-C cables 2019usb-c cable is the new standard for charging laptops and mobile devices, not to mention their capabilities for data and video. here are the best usb-c cable options.
- Super hackers steal tens of millions of credit card datain the biggest bank card theft in the united states, 28-year-old hackers were fined $ 2.7 million and have the ability to 'peel off the calendar' for decades in prison.
- Can your data be stolen when using public Wifi?in technology terms, man-in-the-middle (mitm) is an attack that is intercepted by a third party (hackers) during communication between the server and the user. instead of the data being shared directly between the server and the user, the links will be broken by another factor. then hackers will change the content or add some malware to send to you.
- Please download more than 50 lightning wallpapers, lightning wallpaper for computerslightning wallpaper set, lightning background image in this article includes many colors and will suit the choice of many people.
- How hackers steal 9 million USD from ATM in 1 hourcisco security experts explained the entire process that bad guys apply to withdraw the money with just over 100 real cards.
- Detecting a Thunderbolt flaw allows a hacker to steal system data for 5 minutesrecently, international security researcher bjorn ruytenberg unexpectedly discovered a vulnerability called 'thunderspy' that exists in thunderbolt ports, allowing hackers to easily steal data.
- How to use Photoshop CS5 - Part 26: Create a lightning effectin the next article of the photoshop tutorial series, we will show you the basic steps to create lightning or lightning effects.
- What is USB Type-C, Lightning, which has a superior advantage?you've probably heard of usb type-c and lightning, so you understand what these connection standards are and how they have outstanding advantages? if not, read this article right away.
- World-leading research reveals how lightning produces gamma raysthe moment two electric currents collide to form lightning has been captured on camera, revealing for the first time the process's role in generating powerful gamma rays right here on earth.