June 23, 2024

The USB cable steals passwords and data remotely and transmits wirelessly

2 min read
dois cabos USB enrolados, um ao lado do outro, sob um tapete, sendo que apenas um deles rouba senhas

A security researcher has developed a USB Type-C cable that does everything a user expects, plus more: quickly send files, connect devices, charge a cell phone, and finally steal passwords and user data.

Developed by an expert called MG, the spy device is a hacking tool capable of acting as a physical keylogger, stealing every keyboard on any connected device and sending data miles away.

publicity celebrity

The cable, dubbed “OMG Cable”, was in the prototype stage in 2019 and began to be commercialized by cybersecurity firm Hak5. At the time, the product was aimed only at Apple users, performing the same functions on a Lightning cable. Now MG has created a different shape of the connector.

“There were people who said that Type-C cables were shielded from this type of implant because there was not enough space. I obviously had to prove them wrong,” says the hacker.

Two USB cables are wrapped next to each other under a rug, only one of them steals passwords
A fake USB cable is almost indistinguishable from the original. (Image: Digital Outlook assembly via the motherboard)

USB cables create a network hotspot with a range of more than one kilometer

OMG cables work by creating a network connection point, half the size of a connector, that a hacker can connect to from their own devices. Once connected, the attacker opens a browser screen and steals what the keyboard is while connecting the USB cable: words, phrases, logins and passwords.

Additionally, the cables have a geo-blocking feature, whereby an attacker can block access to stolen data based on distance. MG claims to have tested cables in Oakland, California, and was able to pick up information from a distance of a mile away.

via vice

Read more:

You have seen our new videos on Youtube? Subscribe to our channel!

Leave a Reply

Your email address will not be published. Required fields are marked *