Def Con developer sells $200 Mac-hacking iPhone cables
A Def Con attendee has developed a malicious iPhone cable that allows attackers to remotely execute commands on a victim's device and was selling it to anyone who could find him.
The cable itself looks like any other iPhone Lightning cable: white, regular length, charges the phone and prompts iTunes to open whenever it connects to a computer but has an embedded wireless module that allows hackers to control a Mac computer connected to the cable from afar.
The developer, going by the alias MG, said that an attacker could launch a command or malicious payload through a specially crafted app from within a 300ft vicinity of the target. This could theoretically increase to a limitless range if the attacker configured the cable to act as a client to a nearby network if it supported an external internet connection.
Selling for $200, the cable has made the news previously when it was first created but this is the first time it's gone on sale. The potential implications of its distribution could be disastrous, especially in the business world.
Imagine a scenario where a person posing as a prospective job candidate enters the office building for an interview, but accidentally leaves the cable behind, only for an opportunistic employee to take it for themselves at the end of the day after realising the cable has no owner.
The employee could then come to work the next day and charge their phone as normal using their Mac, leaving the entire company's network vulnerable to remote attacks - a big reward for a relatively small $200 investment.
These types of attacks aren't out of the ordinary, in December 2018 it was revealed that eight European banks were targeted by criminals who stole millions after planting rogue Raspberry Pi devices in meeting rooms.
"It's likely something that will be limited to very targeted attacks, such as swapping out a CEO's legitimate cable with a fake one," said Javvad Malik, security awareness advocate at KnowBe4. "One could conceive this being placed in a public place, such as an airport charging station, but it's probably easier for willing attackers to compromise public WiFi connections by setting up their own rogue hotspots.
"It may not be possible for the average person to tell whether a cable has been modified, so when in doubt, or when travelling, it may be worth using a 'USB condom' which, when used, blocks any data transfer, and only allows charging of a device."
MG said on his blog that the cables "are hand-built, and take ~4hrs to make" but he only lets around 10-20% of the cables he makes go out for sale after an extensive testing period.
According to MG, people that bought the cable at the Las Vegas security conference received "the cable, a bonus physical programmer (if you brick the device or use self destruct), access to the private early access group, and a 50% off discount code that can be used when the production cable goes live on Hak5".
MG added that the poor yield from his efforts "should be solved by moving this into manufacturing" but he noted there wasn't enough time to solve that before Def Con.
This year's annual security conference wasn't in short supply of weird and wonderful security news. Yesterday IT Pro reported that researchers had devised a way to remotely inject ransomware into DSLR cameras - a previously unknown attack vector that could be particularly harmful to tourists.
source itpro
Industry: Cyber Security
Latest Jobs
-
- Senior Client Microsoft Security Delivery Consultant - Hybrid (London | Remote)
- London
- N/A
-
Senior Client Microsoft Security Delivery Consultant - Hybrid (London | Remote) We are seeking an experienced technical Security Consultant to help clients deploy and enhance their cyber defences across Microsoft and vulnerability management technologies. You will work with enterprise customers to deliver tailored solutions across threat detection, endpoint protection and exposure management, ensuring security platforms are efficient, integrated and aligned with operational goals. Whilst you won't do the design yourself- you will work alongside technical Presales to document, agree and then deliver the solution. You will have experience leading delivery the implementation and improvement projects, providing hands-on support with configuration, integration and optimisation. You will assess existing environments, recommend enhancements and guide clients on best practice to strengthen visibility and control. Strong experience with SIEM, XDR and vulnerability tooling (Microsoft & Tenable ecosystems ideal) Understanding of Azure security, identity and access controls Background in consulting or project-based cyber delivery Clear communication skills with the ability to engage senior stakeholders Extra points if you have the SC-100. You must be eligible to achieve UK Security Clearance to be considered for this role.
-
- Account Director | Cyber Security Consulting | UK - South East
- London
- N/A
-
Account Director | Cyber Security Consulting - Financial Services | UK - South East. New Role due to Growth We are looking for an experienced Account Director to develop and expand existing relationships across the financial services sector, working with investment firms, asset managers, private equity groups and strategic partners to deliver intelligent cyber consulting and a bespoke Cyber product offerings. You will act as a trusted advisor, helping organisations strengthen digital resilience, manage third-party and regulatory risk and adopt a proactive approach to cyber assurance. Key Responsibilities Manage a defined portfolio of financial clients, understanding business priorities and aligning tailored cyber solutions. Drive new client engagement while nurturing existing partnerships through a consultative, long-term approach. Present the benefits of advanced cyber services including threat intelligence, vulnerability management, incident readiness, and continuous risk monitoring. Collaborate with technical and delivery teams to ensure smooth engagement from proposal through to implementation and ongoing support. Prepare proposals, negotiate commercial terms, and clearly articulate value and business outcomes. Build trusted relationships at senior and board level. Ideal Profile Strong background in cybersecurity, consulting, or risk management within financial services. Skilled communicator with proven success managing and growing key accounts. Able to translate complex technical insight into commercial and strategic value for clients. Confident engaging with senior stakeholders and decision makers. Please note: Sponsorship is not available.