Fake iPhone cables can hijack computers | Inquirer Technology

Man creates fake iPhone charging cable that can hijack computers, exposes weaknesses in mobile security

/ 06:03 PM August 15, 2019

A man has recently developed a fake iPhone charging cord that can hijack computers through Wi-Fi, which sheds a light on how vulnerable mobile security systems could be.

Security researcher Mike Grover, also known as MG, made the malicious cable by modifying an existing iPhone cable, as per Vice last Saturday, Aug. 10. Grover stresses that the cable’s capacity to be modified for hacking highlights an under-investigated area of mobile security, as per TechRadar on Aug. 12.

iPhone cable

INQUIRER.net stock photo

Grover presented the cable, named O.MG cable, at the annual Defcon cybersecurity convention in Las Vegas, United States, last Aug. 8 to 10.

ADVERTISEMENT

“It looks like a legitimate cable and works just like one. Not even your computer will notice a difference,” Grover said in the Vice report. “Until I, as an attacker, wirelessly take control of the cable.”

FEATURED STORIES

The researcher included an implant in the cord which allows hackers to remotely connect to the computer it is plugged into with the use of Wi-Fi.

Once plugged in, the cable connects via the IP address and lets attackers take control of the system, as per report. The hackers can then execute commands on the victim’s computer.

“It’s like being able to sit at the keyboard and mouse of the victim but without actually being there,” Grover was quoted as saying.

The cable also has a Wi-Fi range of 300 feet and a kill switch to erase the hacker’s presence once they are done with the attack. Ryan Arcadio/JB

RELATED STORIES: 

Chinese man guilty of defrauding Apple out of 1,500 iPhones

ADVERTISEMENT

Hackers ‘sabotaged’ Army recruitment website – official

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

TOPICS: Apple, Defcon, hacking, iPhone, security researchers
TAGS: Apple, Defcon, hacking, iPhone, security researchers

© Copyright 1997-2024 INQUIRER.net | All Rights Reserved

We use cookies to ensure you get the best experience on our website. By continuing, you are agreeing to our use of cookies. To find out more, please click this link.