With this fake Lightning cable, hackers can remotely take over your computer in minutes

Thanks to the Lightning O.MG cable that MG security researcher was able to access remotely, opened a terminal window on the Mac's screen and forced them to run some commands on the computer.

A security vendor with the nickname MG brought the Def annual security conference. The lightning-free Lightning cable, called O.MG Cable, was created by himself to help hackers take over your computer. in minutes. Here, MG demonstrated O.MG Cable's capabilities in the presence of Motherboards.

The cable O.MG Cable has the same appearance as any other Lightning cable. When a Motherboard reporter used it to connect the iPod to a Mac computer, everything worked just as well as any other cable, even the computer didn't recognize the difference: the iPod started charging, iTunes realized it was and the iPod issued a message asking if the user trusted the computer.

With this fake Lightning cable, hackers can remotely take over your computer in minutes Picture 1With this fake Lightning cable, hackers can remotely take over your computer in minutes Picture 1

However, not long after, thanks to the Lightning O.MG cable that MG security researcher was able to access remotely, opened a terminal window on the Mac's screen and forced them to run some commands on the computer. .

This fake Lightning cable was modified by MG and implanted with additional parts inside the cable, allowing the researcher to remotely connect to the computer plugging the cable.

MG said, Lightning O.MG cable has the same shape and operation as other normal cables, users even cannot recognize the difference until the computer is controlled by hackers. wirelessly through that cable.

With this fake Lightning cable, hackers can remotely take over your computer in minutes Picture 2With this fake Lightning cable, hackers can remotely take over your computer in minutes Picture 2

The MG said that hackers could use this fake cable as a gift to the victim. When they plugged the cable into the computer, the hacker started the attack.

Just MG typing the IP address of the fake cable on your computer browser can perform a series of malicious operations. Even to conceal the existence of implants on that cable, hackers can 'erase' traces remotely.

MG said the cable was made by him at home by modifying it from an Apple Lightning cable. These cables are being sold by MG for $ 200 each.

To further demonstrate the ability to hack through its cable, the MG used its phone to attack the target Mac computer at a distance of 300 feet (about 91.4m). He said that this distance could be farther away if the hacker uses an amplifier antenna, even if the attack distance is unlimited if the wireless network has an Internet connection.

Currently MG wants this cable to be produced as a valid security tool.

  1. The iPhone can be hacked with just one message without requiring user interaction
  2. Detecting vulnerabilities in Snapdragon chips allows hackers to penetrate nearly every Android smartphone via wifi
4 ★ | 1 Vote