Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

Evil USB Cable Can Remotely Accept Commands From Hacker

The cable itself looks pretty generic, but the security researcher Mike Grover actually fitted a Wi-Fi chip inside one of the sockets, which can be used to remotely send commands to the connected PC.

By Michael Kan
February 11, 2019
USB Cable Attack

Plugging a USB cable into your PC may seem like a harmless affair. But not if the cable has been made by a hacker.

On Sunday, the security researcher Mike Grover demonstrated the threat by creating a malicious USB cable that can receive commands from a nearby smartphone and then execute them over the PC it's been plugged into.

His USB-to-Lightning cable looks pretty generic, but Grover actually fitted a Wi-Fi chip inside one of the sockets. Unsuspecting users will think they've plugged a simple cord into their PC. But in reality, the computer will actually detect the cable as a Human Interface Device akin to a mouse or keyboard.

Grover uploaded a video, showing the attack in action. In it, he plugs the cable into a MacBook. Then he uses his smartphone to remotely trigger the laptop to visit a malicious Google login webpage that can secretly collect the owner's password.

In an interview over Twitter, Grover said he developed his USB cable attack to work on Windows, Mac, Linux and iOS systems. All the attacker would have to do is trick the victim into plugging in the cord.

"It 'works' just like any keyboard and mouse would at a lock screen. You can type and move the mouse," Grover said. "If you get ahold of the password, you can unlock the machine." The same cable can also prevent the affected device from falling back to sleep by simulating tiny cursor movements.

In addition, the malicious USB cable can be programmed to connect not just to a nearby smartphone, but also to a network, such as a Wi-Fi or a cellular hotspot. Doing this could expand the range of the attack.

To develop the cable, Grover used a $950 CNC milling machine to help enclose the Wi-Fi chips inside the USB-end of the cord. He now plans on producing more malicious USB cables and putting them up for sale. But his goal isn't to cause mayhem.

"Showing attacks in an engaging way allows a wider audience to be aware of threats," he told PCMag. "Getting this cable into the hands of other researcher allows new uses and attacks to be explored. In the end, it leads to improved security."

Grover is among the security researchers who've developed demos over the years showing the dangers of USB-style attacks. For instance, a thumb drive can secretly contain malware. One Hong Kong-based company has even created a USB drive that can potentially fry computers that've been built with inadequate surge protection.

Grover's new attack is a reminder to be careful around USB peripherals that've been provided from unknown sources. To protect yourself, you can consider buying a "USB condom." The device works by only allowing a connected USB cable or device to exchange power — not data — with your computer.

"There are tools out there that can alert you when a new USB device is plugged in or even block new devices. But it's not built into the operating systems by default. That would be nice to see," Grover added.

At the moment, he isn't sure how much his malicious USB cable will cost. But Grover told PCMag, "Trying to turn a profit isn't my priority. I'd rather just get it into the hands of everyone doing security."

Like What You're Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

TRENDING

About Michael Kan

Senior Reporter

I've been with PCMag since October 2017, covering a wide range of topics, including consumer electronics, cybersecurity, social media, networking, and gaming. Prior to working at PCMag, I was a foreign correspondent in Beijing for over five years, covering the tech scene in Asia.

Read Michael's full bio

Read the latest from Michael Kan