Fake iPhone cables can hijack computers | Inquirer Technology

Man creates fake iPhone charging cable that can hijack computers, exposes weaknesses in mobile security

/ 06:03 PM August 15, 2019

A man has recently developed a fake iPhone charging cord that can hijack computers through Wi-Fi, which sheds a light on how vulnerable mobile security systems could be.

Security researcher Mike Grover, also known as MG, made the malicious cable by modifying an existing iPhone cable, as per Vice last Saturday, Aug. 10. Grover stresses that the cable’s capacity to be modified for hacking highlights an under-investigated area of mobile security, as per TechRadar on Aug. 12.

iPhone cable

INQUIRER.net stock photo

Grover presented the cable, named O.MG cable, at the annual Defcon cybersecurity convention in Las Vegas, United States, last Aug. 8 to 10.

Article continues after this advertisement

“It looks like a legitimate cable and works just like one. Not even your computer will notice a difference,” Grover said in the Vice report. “Until I, as an attacker, wirelessly take control of the cable.”

FEATURED STORIES

The researcher included an implant in the cord which allows hackers to remotely connect to the computer it is plugged into with the use of Wi-Fi.

Once plugged in, the cable connects via the IP address and lets attackers take control of the system, as per report. The hackers can then execute commands on the victim’s computer.

Article continues after this advertisement

“It’s like being able to sit at the keyboard and mouse of the victim but without actually being there,” Grover was quoted as saying.

Article continues after this advertisement

The cable also has a Wi-Fi range of 300 feet and a kill switch to erase the hacker’s presence once they are done with the attack. Ryan Arcadio/JB

Article continues after this advertisement

RELATED STORIES: 

Chinese man guilty of defrauding Apple out of 1,500 iPhones

Article continues after this advertisement

Hackers ‘sabotaged’ Army recruitment website – official

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

TOPICS: Apple, Defcon, hacking, iPhone, security researchers
TAGS: Apple, Defcon, hacking, iPhone, security researchers

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our newsletter!

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

© Copyright 1997-2024 INQUIRER.net | All Rights Reserved

This is an information message

We use cookies to enhance your experience. By continuing, you agree to our use of cookies. Learn more here.