Hacking computer with iPhone handheld lightning charging cable

Hacker recently hacked into a computer by connecting an iPhone handheld charging cable to a computer. This cable is very similar to the original cable.

Most people think that charging cables are harmless and use them without any charge to charge your phone or transfer data to a computer, but some hackers in a hacking project are trying to change that notion and potentially endanger users from the potential dangers of charging cables. Be aware of the destructive.

On his Twitter page, a hacker named MG has released a video of a seemingly innocuous, lightweight charging cable featuring small Wi-Fi transmitters that, when connected to a computer, allow a hacker close to the computer just as when Working on computer, running various commands.

The look and function of this cable, called the OMG cable, is almost unlike the iPhone’s original charging cable; the only thing a hacker has to do to penetrate the user’s computer using this dangerous cable is to replace it with the original charging cable. In the next step, the hacker uses a computer within the range of Wi-Fi waves sent by the cable (or a device connected to a Wi-Fi network near the computer) to wirelessly transmit malicious links (instructions that can be used to perform malicious activities). The user transmits; these links can be pre-configured commands or code created by the hacker himself.

Once the cable is connected to the computer, the hacker can remotely control the computer or lock the computer by sending phishing screens in a completely realistic way to the victim, until the user enters his password with a login. , Get her password.


In its first attempt at computer hacking using a charging cable,

MG has chosen Apple’s iPhone Lighting charging cable,

but small WiFi transmitters can be hide in any charging cable, so this method of hacking can put many computers at risk. . MG said about this hack method:

This cable can also be used to send payloads across multiple platforms,

and the transmitters I built can be embedded in different USB charging cables. Apple’s charging cables are the most difficult cables to install,

and the WiFi transmitter’s performance in these cables is a good reason for their efficiency.

MG is said to be one of the redundancies (Reddit is a member of companies and organizations,

usually organizations or companies that are very important in maintaining information security ,

trying to simulate cyberattacks to identify vulnerabilities and security holes) Verizon Media ( (Verizon)

Every day during its business hours it tries to come up with innovative hacking methods

and be aware of and fix them before hackers detect security vulnerabilities.

MG believes that although its malicious recharge cables are a personal project,

it can help Redditers find ways to deal with threats. He says:

We’ve found that hacking hardware can be used by every user repeatedly,

and most of the time users don’t realize the potential dangers of using it; this can change your mindset about your defensive tactics. The NSA’s defensive tactics as an important security organization have not changed much since over 5 years ago, but this is about the threat models (methods of detecting holes and security vulnerabilities that hackers have identified and prioritized in their view). ) Does not apply because some of them are not common.

People don’t expect a charging cable to be dangerous either

Most people today are a little cautious about connecting a flash drive to a computer and not connecting every flash to their computer,

but no one would suspect that a charging cable could also be dangerous; And this training can also be provided at advanced levels.

MG has invested thousands of dollars and countless hours working on its project. It takes four hours to embed and hide Wi-Fi transmitters on each cable, and it has helped some hackers write some code and develop information access methods. In the near future, MG plans to sell its handmade cables online and for free to participants at one of the world’s largest hacker gatherings, the Def Con Computer Security Conference. Of course, the O.MG cable is not yet complete and MG is working on enhancing its performance and features in the future. He says that delivering the final version of his charging cable depends on the time allotted for it and the resources at his disposal; he claims to have a lot of plans and ideas for the cable and will do it all.

Leave a Reply

Your email address will not be published. Required fields are marked *