Security Researcher Develops Lightning Cable With Hidden Chip to Steal Passwords

This article has been indexed from MacRumors: Mac News and Rumors – Front Page

A normal-looking Lightning cable that can used to steal data like passwords and send it to a hacker has been developed, Vice reports.

The “OMG Cable” compared to Apple’s Lightning to USB cable.

The “OMG Cable” works exactly like a normal Lightning to USB cable and can log keystrokes from connected Mac keyboards, iPads, and iPhones, and then send this data to a bad actor who could be over a mile away. They work by creating a Wi-Fi hotspot that a hacker can connect to, and using a simple web app they can record keystrokes.

The cables also include geofencing features that allow users to trigger or block the device’s payloads based on its location, preventing the leakage of payloads or keystrokes from other devices being collected. Other features include the ability to change keyboard mappings and the ability to forge the identity of USB devices.

The cables contain a small implanted chip and are physically the same size as authentic cables, making it extremely difficult to identify a malicious cable. The implant itself apparently takes up around half of the length of a USB-C connector’s plastic shell, allowing the cable to continue to operate as normal.

An x-ray view of the implanted chip inside the USB-C end of an OMG Cable.

The cables, made as part of a series of penetration testing tools by the security researcher known as “MG,” have now entered mass production to be sold by the cybersecurity vendor Hak5. The cables are available in a number of versions, including Lightning to USB-C, and can visually mimic cables from a range of accessory manufacturers, making them a noteworthy threat to device security.

This article, “Securit

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

Similar Posts