Def Con developer sells $200 Mac-hacking iPhone cables

A Def Con attendee has developed a malicious iPhone cable that allows attackers to remotely execute commands on a victim's device and was selling it to anyone who could find him.
The cable itself looks like any other iPhone Lightning cable: white, regular length, charges the phone and prompts iTunes to open whenever it connects to a computer but has an embedded wireless module that allows hackers to control a Mac computer connected to the cable from afar.
The developer, going by the alias MG, said that an attacker could launch a command or malicious payload through a specially crafted app from within a 300ft vicinity of the target. This could theoretically increase to a limitless range if the attacker configured the cable to act as a client to a nearby network if it supported an external internet connection.
Selling for $200, the cable has made the news previously when it was first created but this is the first time it's gone on sale. The potential implications of its distribution could be disastrous, especially in the business world.
Imagine a scenario where a person posing as a prospective job candidate enters the office building for an interview, but accidentally leaves the cable behind, only for an opportunistic employee to take it for themselves at the end of the day after realising the cable has no owner.
The employee could then come to work the next day and charge their phone as normal using their Mac, leaving the entire company's network vulnerable to remote attacks - a big reward for a relatively small $200 investment.
These types of attacks aren't out of the ordinary, in December 2018 it was revealed that eight European banks were targeted by criminals who stole millions after planting rogue Raspberry Pi devices in meeting rooms.
"It's likely something that will be limited to very targeted attacks, such as swapping out a CEO's legitimate cable with a fake one," said Javvad Malik, security awareness advocate at KnowBe4. "One could conceive this being placed in a public place, such as an airport charging station, but it's probably easier for willing attackers to compromise public WiFi connections by setting up their own rogue hotspots.
"It may not be possible for the average person to tell whether a cable has been modified, so when in doubt, or when travelling, it may be worth using a 'USB condom' which, when used, blocks any data transfer, and only allows charging of a device."
MG said on his blog that the cables "are hand-built, and take ~4hrs to make" but he only lets around 10-20% of the cables he makes go out for sale after an extensive testing period.
According to MG, people that bought the cable at the Las Vegas security conference received "the cable, a bonus physical programmer (if you brick the device or use self destruct), access to the private early access group, and a 50% off discount code that can be used when the production cable goes live on Hak5".
MG added that the poor yield from his efforts "should be solved by moving this into manufacturing" but he noted there wasn't enough time to solve that before Def Con.
This year's annual security conference wasn't in short supply of weird and wonderful security news. Yesterday IT Pro reported that researchers had devised a way to remotely inject ransomware into DSLR cameras - a previously unknown attack vector that could be particularly harmful to tourists.
source itpro
Industry: Cyber Security

Latest Jobs
-
- Senior Presales Consultant | Managed Security Services | London
- London
- N/A
-
Senior Presales Consultant – Managed Security Services Location: London-commutable (Hybrid) A well-established cyber consultancy is seeking a Senior Presales Consultant to drive growth across its managed security services / advisory portfolio. This hybrid role bridges commercial and technical expertise supporting solution design, shaping customer proposals, and guiding conversations from scoping through to delivery. Key experience: Background in managed security services, including SOC operations and threat detection Strong knowledge of cloud and on-prem security tooling (SIEM, EDR, IAM) Penetration testing Proven ability to translate technical concepts into clear business value Confident in customer-facing engagements and pre-sales delivery Experience contributing to bids, proposals, and RFI/RFP responses To find out more contact me on 07884666351 Visa sponsorship is unfortunately not available for this role.
-
- New Business | Cyber Security | Overlay sales (UK Based- London commutable)
- London
- N/A
-
New Business Sales Hunter needed | Cybersecurity (UK Based- London commutable) Are you looking for uncapped commission, a fun and sociable team that drives success with no politics? If so...You must Have a demonstrable history of sales success in Cyber Security Follow Weatons law. The role: Seeking a proven New Business Sales Hunter to join an established, successful and expanding team. New business focused - £500-750 GP Sell a blend of security services & professional services. Ideal experience selling some or all of the following Cyber strategy & risk management Managed detection & response (MDR) Penetration testing Compliance & audit support You: Strong cybersecurity/IT services sales track record. Confident selling into mid-market & enterprise. UK based - London commutable Hunter mindset, full sales cycle ownership. Don't just send an email to apply give me a call on 07884666351
-
- New Business Sales Hunter | Cyber Security (UK Based)
- London
- To attract the right person
-
New Business Sales Hunter needed | Cybersecurity (UK Based) Are you looking for uncapped commission, a fun and sociable team that drives success with no politics? If so...You must Be UK based - and able to achieve UK SC clearance. (sorry no visas) Have a demonstrable history of sales success in Cyber Security Follow Weatons law. The role: Seeking a proven New Business Sales Hunter to join an established, successful and expanding cyber security firm. New business focused - £1m GP year one target (ramped). Sell a blend of security services & professional services. Ideal experience selling some or all of the following Cyber strategy & risk management Managed detection & response (MDR) Penetration testing Compliance & audit support You: Strong cybersecurity/IT services sales track record. Confident selling into mid-market & enterprise. UK based - London commutable 1x per week. Hunter mindset, full sales cycle ownership. Don't just send an email to apply give me a call on 07884666351