Apple has shifted to USB-C on its iPad Professional lineup and we solely want if it was accessible for iPhone fashions as properly. Whereas it might take a while for that to occur, a safety researcher has developed a fairly normal-looking Lightning cable that may steal your passwords and knowledge after which ship it to the hacker. The cable is known as OMG Cable and it really works like a traditional Lightning cable. Scroll all the way down to learn extra particulars on the topic.
The OMG Cable is Virtually Similar to the Lightning Cable However Contains a Hidden Chip That Steals Information
As reported by Vice, it could be onerous to identify the OMG cable when positioned subsequent to the Lightning cable as they virtually look alike. The cable can log keystrokes when linked to the MacBook, iPad, and even iPhones. It then sends the info again to the unauthorized one that might dwell miles away. It includes making a WiFi hotspot that’s accessible by the hacker after which utilizing an internet app, the keystrokes could be recorded which can be utilized for miscellaneous causes.
Moreover, the Lightning-like OMG cable additionally features a geofencing characteristic which when triggered can play its half to dam the payloads of the gadget as per its location. This prevents the unintentional leakage of keystrokes from different gadgets. Furthermore, the cable can also be able to altering keyboard mapping and constructing the identification of USB gadgets.
All of those elements are made potential by a tiny chip contained in the cables. The worst half is that the OMG cables are close to similar to the unique Lightning cables when it comes to dimension. As you may see above, the implanted chip takes virtually half of the area of the plastic shell which permits regular functioning of the cable. CHeck out the video beneath that reveals how the operation works.
The OMG cables had been developed by the safety researcher “MG” as a part of the penetration testing instruments. Furthermore, the cables have entered mass manufacturing which can be offered to cybersecurity vendor HaK5. The cables are a menace to a median consumer and the info their gadgets maintain together with different data.
There you’ve got it, of us. We’ll share extra particulars on the cable as quickly as we have now additional data relating to the topic.