Researcher shares how he developed cable that can hijack computers

Oct 26, 2019, 4:39 AM
(Pixabay Photo)...
(Pixabay Photo)
(Pixabay Photo)

Q: I just learned about the OMG cable and can’t understand how something like this is legal!

A: Security researchers are in the business of constantly tinkering with commonly used technology to see if they can discover new exploits and the O.MG cable is another example of this type of work.

What the O.MG cable does

The researcher’s name is Mike Grover and the cable is referred to as the Offensive MG kit, which is where it gets its name.

What makes this device so compelling is that it appears to be a standard Apple Lightning to USB cable that millions of people use to charge and connect their iPhones and iPads to their computers.

Inside of this cable resides a Wi-Fi hotspot and circuitry that can replicate what looks like a mouse and keyboard when it’s connected to a device.

The Wi-Fi hotspot allows a remote hacker (up to 300 feet) to send commands to the target computer as if the hacker were sitting in front of the computer.

It can also connect itself to another Wi-Fi network, which can allow the exploit to be executed from just about anywhere as long as the connection is maintained.

The researcher has uploaded several videos to show how the cable, when plugged in, can be used to remotely exploit whatever computer it’s plugged into.

Grover says he developed this device to show that it can exploit Windows, Mac, Linux and iOS systems, so it’s pretty capable of impacting just about anyone.

He also made it clear that he chose to focus on the Apple cable because it was the most difficult to make work as a regular cable, which means this can be done with any type of USB cable.

How is this legal?

It’s easy to understand how some people would look at a device that seems to be specifically designed for malicious or nefarious intent and question the legality.

“Hacking” technology has a negative connotation for many, but without researchers engaging in this type of activity (referred to as white hat or ethical hacking), the only ones discovering major exploits would be malicious hackers (black hat).

Legally restricting security researchers from any sort of activity of this nature would actually make us all less safe.

By demonstrating that something is possible, it both educates the public and forces technology companies to deal with the exploit and work on ways to mitigate it.

If this researcher was able to build this cable on his kitchen table, how likely is it that it’s already been something developed in secret by sophisticated government backed researchers from around the world.

Keep in mind, this researcher is sharing how he did what he did, along with additional cables that other researchers (and yes, anyone with malicious intent) can experiment with themselves.

How to protect yourself

Learning that this cable exists should send a clear message to everyone – never use any cable or device that you know nothing about on any of your technology.

Rogue USB drives have been around for years and either of these devices could be used to exploit people in crowded places like airports, coffee shops and even on an airplane during a flight, so be aware.

Data Doctors

(Facebook Photo/Otter Voice Meeting Notes)...
Data Doctors

Here are some tips for using free voice recognition software

Today’s voice recognition technology is far from perfected, but if you’re willing to spend the time training yourself, it can be useful.
2 days ago
Jumper cables are jammed to a car battery. Photo: Christophe Gateau/dpa (Photo by Christophe Gateau...
Ken Colburn, Data Doctors

Here are tips for buying car battery jumper packs

The starting price of these battery packs is so cost-effective, it’s kind of a no-brainer to have one for each car in your family.
9 days ago
(AP Photo/Richard Drew)...
Data Doctors

Here is how long different iPhone support services last

Different versions of iPhone support services can last longer than others, so here's a list of how long repair, iOS and app support lasts.
16 days ago
(Pexels Photo)...
Data Doctors

What to do with random PayPal security messages

If you are getting ‘security codes’ from a standard 10-digit phone number, it isn’t PayPal at all.
23 days ago
(Pexels Photo)...
Data Doctors

Here are tips for finding recently added contacts in your iPhone

Here are some other ways to navigate finding recently added contacts in your iPhone.
1 month ago
In this photo illustration the logo and search page of the multi-facetted internet giant Google is ...
Ken Colburn, Data Doctors

How to better examine your Google search sources

Now, more than ever, it’s important to know the source of information you find online and there's a handful of ways to clean up your Google search.
1 month ago

Sponsored Articles

Mayo Clinic Orthopedics and Sports Medicine

Why your student-athlete’s physical should be conducted by a sports medicine specialist

Dr. Anastasi from Mayo Clinic Orthopedics and Sports Medicine in Tempe answers some of the most common questions.
Dr. Richard Carmona

Great news: Children under 5 can now get COVID-19 vaccine

After more than two years of battle with an invisible killer, we can now vaccinate the youngest among us against COVID-19. This is great news.
(Courtesy Condor)...
Condor Airlines

Condor Airlines shows passion for destinations from Sky Harbor with new-look aircraft

Condor Airlines brings passion to each flight and connects people to their dream destinations throughout the world.
Researcher shares how he developed cable that can hijack computers