Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse

The New Coffee Room

  1. TNCR
  2. General Discussion
  3. The "OMG Cable"

The "OMG Cable"

Scheduled Pinned Locked Moved General Discussion
3 Posts 3 Posters 37 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • George KG Offline
    George KG Offline
    George K
    wrote on last edited by
    #1

    https://www.vice.com/en/article/k789me/omg-cables-keylogger-usbc-lightning

    It looks like a Lightning cable, it works like a Lightning cable, and I can use it to connect my keyboard to my Mac. But it is actually a malicious cable that can record everything I type, including passwords, and wirelessly send that data to a hacker who could be more than a mile away.

    This is the new version of a series of penetration testing tools made by the security researcher known as MG. MG previously demoed an earlier version of the cables for Motherboard at the DEF CON hacking conference in 2019. Shortly after that, MG said he had successfully moved the cables into mass production, and cybersecurity vendor Hak5 started selling the cables.

    But the more recent cables come in new physical variations, including Lightning to USB-C, and include more capabilities for hackers to play with.

    "There were people who said that Type C cables were safe from this type of implant because there isn't enough space. So, clearly, I had to prove that wrong. :)," MG told Motherboard in an online chat.

    The OMG Cables, as they're called, work by creating a Wi-Fi hotspot itself that a hacker can connect to from their own device. From here, an interface in an ordinary web browser lets the hacker start recording keystrokes. The malicious implant itself takes up around half the length of the plastic shell, MG said.

    "Now look here, you Baltic gas passer... " - Mik, 6/14/08

    The saying, "Lite is just one damn thing after another," is a gross understatement. The damn things overlap.

    1 Reply Last reply
    • JollyJ Offline
      JollyJ Offline
      Jolly
      wrote on last edited by
      #2

      Bring back the Death Penalty.

      “Cry havoc and let slip the DOGE of war!”

      Those who cheered as J-6 American prisoners were locked in solitary for 18 months without trial, now suddenly fight tooth and nail for foreign terrorists’ "due process". — Buck Sexton

      1 Reply Last reply
      • AxtremusA Offline
        AxtremusA Offline
        Axtremus
        wrote on last edited by
        #3

        That’s why I always use my own cables and chargers whenever I can. Be it rental cars or hotels or airport waiting areas or airplanes, many of them provide USB charging ports but just for peace of mind I prefer to use my own charger plugged into an AC outlet. Much, much harder to electrically hack through the transformer.

        1 Reply Last reply
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        • Login

        • Don't have an account? Register

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • Users
        • Groups