Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Empowering you to understand your world

Dangerous, Fake Lightning Cables Entering Mass Production

We live in a time where security testing is becoming more open and public, and with that comes some unusual activities — such as the mass production of fake iPhone Lightning cables that can hack your computer. They are called ‘O.MG’ cables, and they’re made by Hak5. They have tiny wireless transceivers built in.

The O.MG fake Lightning cables are alleged to be designed for Red Teams (independent penetration testers) to perform penetration testing (often unbeknownst to the company whose network they’re attacking). However, malicious entities may be interested in using them as well. Thieves could use these fake Lightning cables to remotely execute malicious scripts and hack your computer, if they get their hands on them.

This means that (as Apple said) you need to be very careful of where you buy your Lightning cables from, and don’t borrow or take any USB devices from people or sellers you don’t trust. Conterfeit devices are usually unreliable or dangerous from a security or a safety standpoint. There’s always a catch. Apply the same logic to USB drives, physical authentication devices, hardware wallets, and any device that connects to your computer or phone.

These cables look very much like legitimate Lightning cables, so they may at some point find their way into the wrong hands, or the design used to modify existing Lighting cables (unless criminals are already making their own such cables, which wouldn’t be surprising). Hak5 is also selling USB keyrings and Ethernet devices for penetration testing as well. These include the Shark Jack and Bash Bunny.

Share this article
Shareable URL
Prev Post

Tesla Developing Car Battery That Lasts A ‘Million Miles’

Next Post

Encrypt Your USB Drive And Protect Your Data

Leave a Reply

Read next
Subscribe to our newsletter
Get notified when new content is published