With this fake Lightning cable, hackers can remotely take over your computer in minutes
A security vendor with the nickname MG brought the Def annual security conference. The lightning-free Lightning cable, called O.MG Cable, was created by himself to help hackers take over your computer. in minutes. Here, MG demonstrated O.MG Cable's capabilities in the presence of Motherboards.
The cable O.MG Cable has the same appearance as any other Lightning cable. When a Motherboard reporter used it to connect the iPod to a Mac computer, everything worked just as well as any other cable, even the computer didn't recognize the difference: the iPod started charging, iTunes realized it was and the iPod issued a message asking if the user trusted the computer.
However, not long after, thanks to the Lightning O.MG cable that MG security researcher was able to access remotely, opened a terminal window on the Mac's screen and forced them to run some commands on the computer. .
This fake Lightning cable was modified by MG and implanted with additional parts inside the cable, allowing the researcher to remotely connect to the computer plugging the cable.
MG said, Lightning O.MG cable has the same shape and operation as other normal cables, users even cannot recognize the difference until the computer is controlled by hackers. wirelessly through that cable.
The MG said that hackers could use this fake cable as a gift to the victim. When they plugged the cable into the computer, the hacker started the attack.
Just MG typing the IP address of the fake cable on your computer browser can perform a series of malicious operations. Even to conceal the existence of implants on that cable, hackers can 'erase' traces remotely.
MG said the cable was made by him at home by modifying it from an Apple Lightning cable. These cables are being sold by MG for $ 200 each.
To further demonstrate the ability to hack through its cable, the MG used its phone to attack the target Mac computer at a distance of 300 feet (about 91.4m). He said that this distance could be farther away if the hacker uses an amplifier antenna, even if the attack distance is unlimited if the wireless network has an Internet connection.
Currently MG wants this cable to be produced as a valid security tool.
- The iPhone can be hacked with just one message without requiring user interaction
- Detecting vulnerabilities in Snapdragon chips allows hackers to penetrate nearly every Android smartphone via wifi
You should read it
- This unremarkable looking Lightning cable can steal your data and send it to hackers
- 5 reasons why Apple should ditch the Lightning cable
- Apple reduced the price of USB-C cables to Lightning to $ 19
- New USB cable type allows hackers to perform remote attacks
- These are the types of printer cables needed to connect to the computer
- 4 best USB-C cables 2019
- We can still survive after being struck by lightning, why?
- Distinguish common types of computer cables
- How are APG and AAG cables different?
- 13 unexpected facts about sea cable routes
- Map of 420 Internet cables, stretching 1.1 million kilometers on the seabed around the world
- Shocked the series of lightning strikes causing mass death
Maybe you are interested
AI can analyze radiation from HDMI cable signals to hack data on the screen
Why do marine fiber optic cables continuously break? How to repair fiber optic cable?
How to use app 1.1.1.1 to watch movies and play games when the cable breaks
The wrong way to charge your iPhone causes the charging cable tip to turn black
How to charge AirPods wirelessly or with a power cable
Special cable, only a few countries in the world can produce it