Friday, September 20


The action seems to be very normal but can accidentally cause you to fall into the trap of the bad person without knowing it.

In most cases, when your smartphone or tablet runs out of battery in the middle, you often borrow someone’s cable and charger around you for a temporary charge. Of course, many people consider it a normal action, but according to network security experts, this may be a potential behavior with many worrisome security risks.

Charles Henderson, global managing partner and manager of X-Force Red at IBM Security, said: “There are certain things in this life that you should not borrow from someone. If you are traveling and receiving So, you forget to bring underwear, of course you won’t be able to ask your partner to lend you underwear. You should go to a store and buy new underwear. “

Speaking of which, Henderson wanted to mention the phone charging cables. According to Forbes, Henderson is currently running a group of hackers specializing in hiring hackers to break into customers’ computer systems to find security holes. Since then, Henderson’s hacker team has come up with the idea of ​​implanting malicious code into a charging cable to gain remote control of devices and computers.

That’s why Henderson advises people not to rely too much on someone’s charging cable that you don’t know. Henderson insisted: “We can send someone an iPhone charging cable through the mail and see if that person plugs it into the device.”

Last week at the DEF CON Hacking Annual Meeting in Las Vegas (an annual summer camp for hackers), a hacker demonstrated an iPhone charging cord with malicious code. After using the cable to connect the iPhone to the Mac computer, this person was able to remotely access and control the Mac. Even hackers can remotely kill malicious code via the connection cable. Currently, this guy is selling the toxic charging cables named O.MG for $ 200 / unit.

According to Henderson, malicious charging cables are not a common threat at this time, because this type of attack is difficult to implement on a large scale but can only target specific objects. .

However, because we have not seen an attack like this, many people are not interested in protecting themselves against threats. Henderson asserts that this attack method is quite cheap, easy to manufacture and also very sophisticated. It disguises itself as a charging cable so users don’t pay much attention. However, it would be dangerous if these malicious cables were massively produced and sold in the future.

Currently, according to Henderson, the bigger threat than malicious charging cables is USB charging stations in public places like airports, subway stations, etc. This is one of the hackers’ favorite places if they are bad intentions, want to infiltrate the user’s device to steal data.

Henderson’s best advice is to always be alert when charging in public and borrowing someone’s charger. Basically, sharing the charging cable is like sharing a password, so be careful.