Nintendo-Power

Daily Gaming news, videos, reviews, tips & guides. Let's share our love of BigN games!

Lightning cord that absorbs your data thanks to its hidden chip

Lightning cord that absorbs your data thanks to its hidden chip

Security researchers made a lightning rod, which is completely harmless, but still has a hidden chip that is malicious. This allows third parties to steal data for remote transfers.

The OMG cable is indistinguishable from the official lightning cable at first glance

OMG cable is indistinguishable from the official lightning cable at first glance // Source: Motherboard

He doesn’t seem too bad … yet. Designed by members of the Security Researchers Group “MG”, OMG Cable a Lightning Damaged in a different appearance from the official cable. However, inside, a chip can hide and steal data, creating a WiFi hotspot for the hacker to connect to it using a hacker. When used to connect to Mac, iPad or even a keyboard IPhoneIt can be used specifically to record keystrokes … thus sending identifiers and passwords, among others.

Macromers This cable also has geofencing functions, which makes it possible to specifically implement, or rather prevent, PayloadS (The The affected area can be harmful to the victim) Depending on the location. One way for a hacker to gain sanity, however, is to avoid collecting data on devices other than the targeted device.

Harmful cable … very difficult to distinguish from the real one

If the OMG cable is too strong, its integrated malicious chip will not change the appearance of the shaft. The latter actually retains the same size and the same combination of regular lightning cable. So it is very difficult to tell the difference by official cable.

As pointed out Macromers, The fitted chip finally occupies only half of the plastic shell of the USB-C connector, allowing the cable to operate normally. So it is difficult for the user to suspect anything.

“OMG Cable” Scanned to Reveal Lightning-USB-C X-Ray Malicious Chip // Source: MG

The purpose of this cable, which is now manufactured in several versions by security expert Hak5, is to act as a tool for penetration testing. Fined, It should therefore be possible to strengthen the security of targeted devices.

See also  Ignorance does not take many days