iPhone users face a serious threat: seemingly innocent chargers may wreak havoc on their devices. These malicious cables, known as O.MG cables, contain hidden implants with web servers, USB communications, and Wi-Fi access, enabling them to capture keystrokes, steal credentials, exfiltrate data, and install malware.
The O.MG cable is a deceptive hacker device. Publicly available since 2019 for $180, it poses a significant security risk. A recent social media demonstration showed a cyber security professional gaining full remote access to a new computer by simply plugging in what appeared to be an ordinary charger. The Elite Series, launched in 2023, comes in various form factors, including USB-A, USB-C, USB-A to -C adapters, and even USB Data Blockers. This makes it increasingly difficult to identify and protect against these malicious devices. Key features are:
- Looks identical to standard cables.
- Contains an implant with web server and Wi-Fi capabilities.
- Allows remote access from up to 300 feet away.
- Potentially unlimited range when configured as a wireless network client.
The Federal Communications Commission (FCC) and FBI have issued warnings about the misuse of public USB ports by bad actors. Hackers can exploit USB charging stations in airports and hotel lobbies to introduce malware and monitoring software onto unsuspecting users’ devices. Protect yourself by:
- Using only chargers you’ve purchased yourself
- Avoiding public USB charging ports
- Remaining vigilant, especially during holiday travel seasons
While designed for professional security testing, these cables pose a real danger in the wrong hands. Users should exercise caution when connecting their devices to unfamiliar power sources or cables.
Comments are closed for this post.