O.MG has introduced its newest offering, a malicious Lightning to USB-C cable that was hand-made to look and feel exactly like a regular Apple cord from the outside.
The new O.MG cable is capable of delivering payloads and detecting keystrokes on standard operating systems, smartphones and tablets, allowing hackers to view usernames, passwords, and other inputs from over 2KM away. A geofencing feature further allows the user to trigger or block malicious payloads based on the device’s physical location, and disarm or self-destruct when it falls out of scope. Additional features boast an easy-to-use interface, one-click payloads, remote Wifi access, and a scriptable Websocket. A special Keylogger Edition cable is able to store up to 650,000 keystrokes and detect inputs from detachable keyboards while retaining standard functionality.
To counter the hacker cables, O.MG introduced a Malicious Cable Detector which analyses cable behavior and blocks data while charging. An LED indicator flashes red if a problem is detected, and additional features can be created with Arduino IDE.
The new O.MG Lightning to USB-C Cable, Keylogger Edition cable, and Malicious Cable Detector are now available on the HAK5 online shop for $139.99, $179.99 and $39.99 USD respectively.
New: tried out the newer OMG Cables, one being a Lightning to USB-C cable that looks identical to the real Apple one. But it silently sends everything you’re typing on your keyboard to an attacker’s device potentially a mile away https://t.co/vJU4MjiQiu pic.twitter.com/FZjEEFVZ2V
— Joseph Cox (@josephfcox) September 2, 2021
Top story: @_MG_: ‘Lots of people asked for detections and defenses. So I made one.
— Bhavuk Arora (@BhaavukAroraa) August 25, 2020
Elsewhere in tech, Bose debuts the QuietComfort 45 headphones.