Upgraded version of O.MG hacking cable packs nefarious new capabilities

Posted:
in General Discussion
A new version of the O.MG hacking tool, which looks like an unassuming Lightning cable, can compromise a range of devices and inject commands, log keystrokes, and more.

Credit: Hak5
Credit: Hak5


The O.MG Elite was recently showed off at the DEFCON cybersecurity conference in Las Vegas, and The Verge recently took a look into the nefarious accessory's capabilities.

"It's a cable that looks identical to the other cables you already have," creator MG said. "But inside each cable, I put an implant that's got a web server, USB communications, and Wi-Fi access. So it plugs in, powers up, and you can connect to it."

Although the cable looks innocuous enough, it actually has the ability to covertly harvest data from devices, log keystrokes on computers, and carry out other attacks.

Compared to previous versions of the O.MG cable, the new O.MG elite packs expanded network capabilities that allow for bidirectional communication. In other words, it can listen for incoming commands from an attacker and send data from a device that it's connected to back to a control server.

Like other products sold by penetration testing tool company Hak5, the OM.G Elite has a range of capabilities. It can inject keystrokes -- or keyboard commands -- that allow it to launch apps, download malware, or steal passwords saved in Chrome.

Because of its new network features, it can then send any data that it has stolen back to an attacker. Additionally, the cable can function as a key logger that can capture the words, numbers, and characters that a user types on a machine.

The types of attacks that the cable can carry out rely on being plugged into a machine. However, that physical access could allow an attacker to compromise a range of devices, from a Mac to an iPhone.

Who's at risk

As with most sophisticated penetration testing or hacking tools, the average iPhone or Mac users has little to worry about. Unless you're a high-value target, it's unlikely that you'll be compromised with an O.MG cable.

The O.MG Elite also costs $179.99, which likely puts it out of the price range of low-level scammers. It's a tool for professionals, in other words.

With that being said, a mitigation tactic would include only using cables that you purchased yourself -- and to just generally not trust random accessories that you find or someone gives you. But, this has been good advice for more than a decade.

Read on AppleInsider

Comments

  • Reply 1 of 10
    lam92103lam92103 Posts: 135member
    A Thunderbolt/USB-C version of this would be interesting. It should be able to extract quite a bit more
    watto_cobra
  • Reply 2 of 10
    cpsrocpsro Posts: 3,206member
    This is cheap and will only get cheaper. I don't understand anyone arguing it's too expensive to be of concern. (The seller might have an interest in downplaying the threat, though, to avoid scrutiny and keep selling the device.)
    edited August 2022 JaiOh81bloggerblogwatto_cobrajony0
  • Reply 3 of 10
    netroxnetrox Posts: 1,439member
    lam92103 said:
    A Thunderbolt/USB-C version of this would be interesting. It should be able to extract quite a bit more
    They already have that as well. 

    https://shop.hak5.org/products/omg-cable?variant=39808315490417
    doozydozenjony0
  • Reply 4 of 10
    netroxnetrox Posts: 1,439member
    Also, keep in mind that consumers will unlikely get OMG cables on Amazon or BestBuy or anything of that sort as the cost of cable is high. Consumers would not buy a cable that would be worth that much money. A victim would have to be of a high value and the attacker would have to physically give them the cable making it more difficult. 

    It will become a concern as soon as the costs go down enough that there's no difference in cost between OMG and nonOMG cables and by then, it's likely USB standards will require implementations to counteract those kind of attacks. 
    watto_cobra
  • Reply 5 of 10
    I have seen on a few occasions a charging cable being made available to passengers in a Uber or Lyft car. I think I used one once a few years ago, but when I first heard about these hacking cables, never again will I plug into a cable in a ride-share or in public phone charging facilities. 

    Also, the article and some of the comments here suggest that the price will deter some people, but as the article states, "it's a tool for professionals." Well, there are enough of these "professionals" out there that put card skimming devices on ATM and gas pumps or who use key fob relay devices to break into your car. To them, less than a couple hundred bucks is no big deal. So while it's probably true that most of us don't need to be overly concerned, especially as long as we're being diligent, there's still plenty to be concerned about. The fact that some "low level scammers" would be deterred is no comfort.
    netroxMrBunsideJaiOh81watto_cobra
  • Reply 6 of 10
    netrox said:
    Also, keep in mind that consumers will unlikely get OMG cables on Amazon or BestBuy or anything of that sort as the cost of cable is high. Consumers would not buy a cable that would be worth that much money. A victim would have to be of a high value and the attacker would have to physically give them the cable making it more difficult. 

    It will become a concern as soon as the costs go down enough that there's no difference in cost between OMG and nonOMG cables and by then, it's likely USB standards will require implementations to counteract those kind of attacks. 
    I have to disagree. I don’t think $200 for a cable with these capabilities is expensive at all. 
    watto_cobra
  • Reply 7 of 10
    9secondkox29secondkox2 Posts: 2,799member
    Wow. Well, this is pretty bad. Apple needs to find a away to make iOS devices verify that none of this functionality exists within a cable plugged into it - or refuse to connect. 
    JaiOh81watto_cobra
  • Reply 8 of 10
    bloggerblogbloggerblog Posts: 2,470member
    Why is the creator of such a nefarious device was able to casually talk about it without consequences, shouldn’t he be arrested or have his product banned? And while they’re at it arrest the guys at Pegasus. Scammers and their suppliers are the scum of the tech world 
    JaiOh81watto_cobrajony0
  • Reply 9 of 10
    While the cables is well done and looks like an ordinary cable, the threat possibility is overblown. The documentation, article and website lists no threats to iPhones, etc. This seems mainly to host computers. The average person isn't picking one up as they are looking to buy a $5 cable, not something $50, $100, or $200. There is no documentation on what the maximum range is and it uses a tiny chip antenna. The range is going to be on the low end of Wifi and we know Wifi has problems. Add in walls, desk, and computers themselves, you are severely limiting range. Wrap some foil around the active end and the wifi is done. 

    What real life situations are you going to use this? Hope there is free wifi nearby as you are unlikely to know the person't wifi passwords? Have another device nearby to capture the wifi? The cable must be plugged in to even get power and according to documentation, requires only 5v, otherwise you can fry it, even on USB-C. Sending these out randomly to people isn't going to work, as there is no way to get the payload out, unless the wifi can connect. Best case is having physical access to the person and able to follow them. Nearby apartment, cafe, airport, or someplace they charge at, within range.

    The main problem is there is no security with cables. Most people will never be affected. Buy your own cables from known brands, from known good stores. Don't hookup unknown usb cables, devices, or chargers.  
    watto_cobra
  • Reply 10 of 10
    dewmedewme Posts: 5,432member
    Why is the creator of such a nefarious device was able to casually talk about it without consequences, shouldn’t he be arrested or have his product banned? And while they’re at it arrest the guys at Pegasus. Scammers and their suppliers are the scum of the tech world 
    As the article states, this product is presented as having legitimate purposes including security penetration testing. It's also apparent to me that this product could also be used as a debugging tool for sniffing the communication link and protocols between connected devices that are supported over Lightning cables. Many tools that have legitimate uses can be repurposed and/or misused for nefarious reasons, e.g., hammers and bolt cutters. Even though the maker of this particular snooping cable probably intends to target customers with nefarious intentions, the fact that it is presentable as having potentially legitimate applications would make banning it and other similar products nearly impossible.

    Regardless of this product's intent, this is a warning to the computer consuming public that yet another security threat genie is out of the bottle. We all need to be cautious about what we connect to our devices, whether SD cards, USB thumb drives, USB I/O devices (keyboards, mice, tablets, cameras, audio devices, etc.), USB toys/lights/etc., and now, any cable that supports any sort of communication protocol, even when there appears to be only a single connection endpoint, like with a charging cable.

    Not only do we have to be careful about what we plug into our devices, e.g., don't stick a USB thumb drive you found in the parking lot outside your workplace into your computer, like anyone would ever do that - ha ha Stuxnet. We have to be very careful about where we source the things we purchase that we plan to plug into our devices. It's not like the maker of this Lightning hacking cable is going to start selling these at truck stops for $10 USD, at least not yet, but there are a wide range of connected products at all price points that could present similar threats to what this cable presents. 
    Alex1Nwatto_cobrajony0
Sign In or Register to comment.