From here, an interface in an ordinary web browser lets the hacker start recording keystrokes. The OMG Cables, as they’re called, work by creating a Wi-Fi hotspot itself that a hacker can connect to from their own device. So, clearly, I had to prove that wrong,” MG told Motherboard in an online chat. “There were people who said that Type C cables were safe from this type of implant because there isn’t enough space. MG told Motherboard that he did so in part because people claimed it couldn’t be done. He later made the cable available for sale to penetration testers, and has now created a USB-C version.
We first saw an example of a malware USB-A cable back in 2019 when a security researcher known as MG demonstrated it to Motherboard. A USB-C to Lightning cable with a hidden wireless key-logger can enable an attacker to capture everything you type from a distance of up to a mile.Īny tech-literate person knows you should never plug a USB key into any of your devices unless you trust the person giving it to you, but fewer know that the same applies to USB cables …