With this fake Lightning cable, hackers can remotely take over your computer in minutes
A security vendor with the nickname MG brought the Def annual security conference. The lightning-free Lightning cable, called O.MG Cable, was created by himself to help hackers take over your computer. in minutes. Here, MG demonstrated O.MG Cable's capabilities in the presence of Motherboards.
The cable O.MG Cable has the same appearance as any other Lightning cable. When a Motherboard reporter used it to connect the iPod to a Mac computer, everything worked just as well as any other cable, even the computer didn't recognize the difference: the iPod started charging, iTunes realized it was and the iPod issued a message asking if the user trusted the computer.
However, not long after, thanks to the Lightning O.MG cable that MG security researcher was able to access remotely, opened a terminal window on the Mac's screen and forced them to run some commands on the computer. .
This fake Lightning cable was modified by MG and implanted with additional parts inside the cable, allowing the researcher to remotely connect to the computer plugging the cable.
MG said, Lightning O.MG cable has the same shape and operation as other normal cables, users even cannot recognize the difference until the computer is controlled by hackers. wirelessly through that cable.
The MG said that hackers could use this fake cable as a gift to the victim. When they plugged the cable into the computer, the hacker started the attack.
Just MG typing the IP address of the fake cable on your computer browser can perform a series of malicious operations. Even to conceal the existence of implants on that cable, hackers can 'erase' traces remotely.
MG said the cable was made by him at home by modifying it from an Apple Lightning cable. These cables are being sold by MG for $ 200 each.
To further demonstrate the ability to hack through its cable, the MG used its phone to attack the target Mac computer at a distance of 300 feet (about 91.4m). He said that this distance could be farther away if the hacker uses an amplifier antenna, even if the attack distance is unlimited if the wireless network has an Internet connection.
Currently MG wants this cable to be produced as a valid security tool.
- The iPhone can be hacked with just one message without requiring user interaction
- Detecting vulnerabilities in Snapdragon chips allows hackers to penetrate nearly every Android smartphone via wifi
You should read it
- Apple reduced the price of USB-C cables to Lightning to $ 19
- New USB cable type allows hackers to perform remote attacks
- These are the types of printer cables needed to connect to the computer
- 4 best USB-C cables 2019
- We can still survive after being struck by lightning, why?
- Distinguish common types of computer cables
- How are APG and AAG cables different?
- 13 unexpected facts about sea cable routes
May be interested
- More than 1 million computers are infected by hackershackers design fake websites to scare internet users to download and install fake antivirus software.
- Surgical cable charging iPhone fake goods and genuine goods to see 'expensive but sliced'let's surgery on two iphone charger cables, one genuine, cost about 20 usd and a product with the same design but cheap, only 1.5 usd to see how different they are.
- The security hole allows hackers to hack iPhone remotely, update iOS nowhackers can exploit this vulnerability to remotely reboot or take full control of an ios device (iphone, ipad, ...).
- Distinguish common types of computer cablescurrently there are 10 popular computer cables including: vga cable, dvi cable, hdmi cable, usb cable, ide cable, sata cable, esata cable, firewire cable, ethernet / lan cable, power cable. each one is through a certain interface to transmit the same signal, or signal, sound, image. so what are the characteristics of those 10 cables?
- 4 best USB-C cables 2019usb-c cable is the new standard for charging laptops and mobile devices, not to mention their capabilities for data and video. here are the best usb-c cable options.
- How to use Photoshop CS5 - Part 26: Create a lightning effectin the next article of the photoshop tutorial series, we will show you the basic steps to create lightning or lightning effects.
- This is why Apple's charger cord is easier to break than 'fake'.if you are an apple user, you probably also realize that the cables sold with its products are easy to break, especially near the connector area.
- What is USB Type-C, Lightning, which has a superior advantage?you've probably heard of usb type-c and lightning, so you understand what these connection standards are and how they have outstanding advantages? if not, read this article right away.
- World-leading research reveals how lightning produces gamma raysthe moment two electric currents collide to form lightning has been captured on camera, revealing for the first time the process's role in generating powerful gamma rays right here on earth.
- The longest lightning in the world reaches more than 320 km9 years have passed but the record for the longest lightning in the world has not been broken, it runs through 3/4 length of the state of oklahoma in america.