The iPhone lightning cables which have been found in enabling remote, as well as malicious access to the computer, is found to be hijacking computers. All these fake cables will help in allowing hackers to tricking their ways into the victims’ computers. As per Mike Grover, the security researcher and also popularly known as MG has been found to be developing a fake lightning-Esque cable which is quite same as the chargers which are generally used for charging the iPhones. Mike Grover said these cables can be easily used for hijacking a PC or a laptop by simply plugging in. He said, “There has been a lot of interest and support behind this project and lots of requests on how to acquire a cable. That’s a great feeling.”
The most surprising part about the cable is that when the cables are plugged into a Mac, Linus or even a Windows computer and they are connected through Wi-Fi or the O.M.G Cable then it will give the hacker complete control over the entire system which will allow the hackers in carrying out the commands remotely. It also has an aftermarket twist which means when a is used to connect a phone to a Mav, it will help the hackers in mounting a wireless hijack of the system.
Mike Grover also said that the cable which we are talking about has been revealed last week at DefConcybersecurity convention where it has been highlighted an under-investigated area of mobile security. Mike Grover further added, “It looks like a legitimate cable and works just like one. Not even your computer will notice a difference. Until I, as an attacker, wirelessly take control of the cable.”
He also said that the cable which a prototype, fortunately, can be used in various ways by the hackers which will allow them in downloading as well as launching malware, removing devices from Wi-Fi connections as well as even reconfiguring the systems.
These cables will also be taking the advantages of a flaw in the operating system of the computer which can detect the cable which will be a part of the input device. This is also be called as a human interface device, commonly known as HID.
Once the system is connected to the IP address of the cable, the attackers will start issuing the commands by using a keyboard as well as a mouse, the operating systems the Human Interface Device to be the input device. This will help in allowing them in the serious move of the hijacked device, downloading the malware as well as opening up software like various browsers for running suspicious payloads.
Mike Grover also claimed that he can even access the attackers at up to 300 feet. But configure the cable “to act as if a client to a nearby wireless network, and if that wireless network has an internet connection, the distance basically becomes unlimited.”
He also shared with Vice’s Joseph Cox, “It’s like being able to sit at the keyboard and mouse of the victim but without actually being there.” The software kit which also comes with the cable consists of various commands for attacking the target machine and then damage the switch for erasing the compromise when the task of hacking is done.
It also consists of a polished UI for erasing to simplify the process. MG said, “It looks like a legitimate cable and works just like one. Not even your computer will notice a difference. Until I, as an attacker, wirelessly take control of the cable.”
The project of the cable is named as the personal hardware learning project as per the researcher. But it has now been morphed into a full-scale development project.
Mike Grover has spent 1000 of hours as well as money to work for this project. Each and every cable has consumed more than 4 to 5 hours for assembling. Not only this but also he worked with various other professional hackers for writing specific codes as well as developing exploits and then he gave his hand-built cables to Def Con along with a plan of selling them online. But the O.M.G. cable is not completed yet. He added he is currently working with other hackers for improving the functionality of the cables as well as expanding the feature set of the cable. He said, “It really just comes down to time at this point. I have a long list in my mind which is going to be the reality. In the end, I was able to create 100 per cent of the implant in my kitchen and then integrate it into a cable. And these prototypes at Def Con were mostly done the same way.”
He also said that the cable is a prototype and can be used in various ways by the hackers which will allow them to download as well as launch suspicious things and reconfigure the system.