Researcher shares how he developed cable that can hijack computers

Oct 26, 2019, 4:39 AM
(Pixabay Photo)...
(Pixabay Photo)
(Pixabay Photo)

Q: I just learned about the OMG cable and can’t understand how something like this is legal!

A: Security researchers are in the business of constantly tinkering with commonly used technology to see if they can discover new exploits and the O.MG cable is another example of this type of work.

What the O.MG cable does

The researcher’s name is Mike Grover and the cable is referred to as the Offensive MG kit, which is where it gets its name.

What makes this device so compelling is that it appears to be a standard Apple Lightning to USB cable that millions of people use to charge and connect their iPhones and iPads to their computers.

Inside of this cable resides a Wi-Fi hotspot and circuitry that can replicate what looks like a mouse and keyboard when it’s connected to a device.

The Wi-Fi hotspot allows a remote hacker (up to 300 feet) to send commands to the target computer as if the hacker were sitting in front of the computer.

It can also connect itself to another Wi-Fi network, which can allow the exploit to be executed from just about anywhere as long as the connection is maintained.

The researcher has uploaded several videos to show how the cable, when plugged in, can be used to remotely exploit whatever computer it’s plugged into.

Grover says he developed this device to show that it can exploit Windows, Mac, Linux and iOS systems, so it’s pretty capable of impacting just about anyone.

He also made it clear that he chose to focus on the Apple cable because it was the most difficult to make work as a regular cable, which means this can be done with any type of USB cable.

How is this legal?

It’s easy to understand how some people would look at a device that seems to be specifically designed for malicious or nefarious intent and question the legality.

“Hacking” technology has a negative connotation for many, but without researchers engaging in this type of activity (referred to as white hat or ethical hacking), the only ones discovering major exploits would be malicious hackers (black hat).

Legally restricting security researchers from any sort of activity of this nature would actually make us all less safe.

By demonstrating that something is possible, it both educates the public and forces technology companies to deal with the exploit and work on ways to mitigate it.

If this researcher was able to build this cable on his kitchen table, how likely is it that it’s already been something developed in secret by sophisticated government backed researchers from around the world.

Keep in mind, this researcher is sharing how he did what he did, along with additional cables that other researchers (and yes, anyone with malicious intent) can experiment with themselves.

How to protect yourself

Learning that this cable exists should send a clear message to everyone – never use any cable or device that you know nothing about on any of your technology.

Rogue USB drives have been around for years and either of these devices could be used to exploit people in crowded places like airports, coffee shops and even on an airplane during a flight, so be aware.

Data Doctors

(Photo by Rafael Henrique/Getty Images)...
Ken Colburn, Data Doctors

Tips to fixing navigation lag in Google Maps mobile app

Before you travel in another city, here are some tips to read over that'll help fix the navigation lag in the Google Maps mobile app.
4 days ago
(AP Photo/Jenny Kane, File)...
Data Doctors

Here’s how the activity app ‘Relive’ can help you remember your adventures

This is how the activity app "Relive" can help you remember your adventures.
11 days ago
(AP Photo/Elise Amendola)...
Ken Colburn, Data Doctors

Grammarly, the tool that takes editing beyond spell check and autocorrect

Grammarly is a tool widely available for use on various devices and goes beyond spell check and auto correct.
18 days ago
(Pexels Photo)...
Data Doctors

How to use Google Photos for group sharing among iPhone and Android smartphones

Here's how to use the Google Photos App for picture sharing between iPhone and Android users.
25 days ago
(Pexels Photo)...
Data Doctors

Here are some screen capture tips for Windows computers

Capturing something on your screen has a variety of uses and Microsoft introduced a much more useful way to do it back in the early 2000s.
1 month ago
Ken Colburn, Data Doctors

Addressing the safety and benefits of Google’s Password Manager

Are you wondering if Google's Password Manager is safe to use? So were we -- here's what we found.
1 month ago

Sponsored Articles

(Courtesy Condor)...
Condor Airlines

Condor Airlines shows passion for destinations from Sky Harbor with new-look aircraft

Condor Airlines brings passion to each flight and connects people to their dream destinations throughout the world.
Carla Berg, MHS, Deputy Director, Public Health Services, Arizona Department of Health Services

Vaccines are safe if you are pregnant or breastfeeding

Are you pregnant? Do you have a friend or loved one who’s expecting?

Best retirement savings rates hit 4.30%

Maximize your retirement savings with guaranteed fixed rates up to 4.30%. Did you know there is a financial product that can give you great interest rates as you build your retirement savings and provide you with a paycheck for life once you retire? It might sound too good to be true but it is not; this product is called an annuity.
Researcher shares how he developed cable that can hijack computers