Weaponized iPhone Charging Cable Comes with Payload that Allow Hackers to Hijack Your Computer

An iPhone charging cable comes with preloaded payload, scripts, and commands that allows hackers to remotely open the terminal on Mac book screen and control the computer.

The lightning cable looks like an ordinary that often used by iPhone users to connect with Macbook to transfer the data, but this weaponized cable comes with extra components that establish the remote connection to the attack.

The security researcher known as MG in Twitter made this dubbed O.MG Cable told motherboard ” “It looks like a legitimate cable and works just like one. Not even your computer will notice a difference. Until I, as an attacker, wirelessly take control of the cable,”  “

MG made this cable in hand by modifying the real Apple cables and deploy the implant that performs the various malicious operation including executing the script, remotely “kill ” the USB implant.

Typing an IP address of the cable in phone browser will open a list of options such as opening a terminal on Mac, in which hackers can execute the various commands and run all set of tools.

“In the end, I was able to create 100 percent of the implant in my kitchen and then integrate it into a cable. And these prototypes at Def con were mostly done the same way,”  MG said.

He is selling the modified iPhone Charging Cable for $200 each that including “You will get the cable, a bonus physical programmer (if you brick the device or use self destruct), access to the private early access group, and a 50% off discount code that can be used when the production cable goes live on Hak5 

Also, he wanted to produce as a legitimate security tool in the future and also these cables would be made from scratch rather than modified Apple ones.

Currently, an attacker within 300 feet radius with a smartphone can be able to connect with the computer directly.  

“A hacker could use a stronger antenna to reach further if necessary, “But the cable can be configured to act as a client to a nearby wireless network. And if that wireless network has an internet connection, the distance basically becomes unlimited.”MG added.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…

1 day ago

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…

3 days ago

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…

3 days ago

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…

3 days ago

Google Chrome Security, Critical Vulnerabilities Patched

Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…

3 days ago

Notorious WrnRAT Delivered Mimic As Gambling Games

WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…

4 days ago