The Lemmy Club
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
brachiosaurus@mander.xyz to Today I Learned@lemmy.worldEnglish · 12 hours ago

TIL for at last 15 years US government has been able to implant hardware into USB cables to turn them into hacking devices with wireless capability.

en.wikipedia.org

message-square
43
link
fedilink
348

TIL for at last 15 years US government has been able to implant hardware into USB cables to turn them into hacking devices with wireless capability.

en.wikipedia.org

brachiosaurus@mander.xyz to Today I Learned@lemmy.worldEnglish · 12 hours ago
message-square
43
link
fedilink
ANT catalog - Wikipedia
en.wikipedia.org
external-link
alert-triangle
You must log in or # to comment.
  • pipi1234@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    ·
    1 hour ago

    I knew about these, but always thought I could spot them.

    I wouldn’t!!!

  • Gammelfisch@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    58 minutes ago

    Impressive and spooky.

  • YiddishMcSquidish@lemmy.today
    link
    fedilink
    English
    arrow-up
    6
    ·
    2 hours ago

    This is pretty much the reason I exclusively use dollar store cables and/or dedicated chargers. Saw a yt video about these things at an airport. The more I learn about tech, the more it makes me wanna uncle Ted the fuck out.

  • Possibly linux@lemmy.zip
    link
    fedilink
    English
    arrow-up
    3
    ·
    2 hours ago

    I am not terribly worried about USB/thunderbolt attacks since Android requires authentication before it does anything.

  • fallaciousBasis@lemmy.world
    link
    fedilink
    English
    arrow-up
    19
    ·
    7 hours ago

    Anyone can do this.

  • Widdershins@lemmy.world
    link
    fedilink
    English
    arrow-up
    6
    ·
    5 hours ago

    I’ve been using wireless chargers for years. I find it “more secure” in the sense that my phone’s port is full of gunk and if I want to wake up with full batteries I can count on wireless a lot more.

    • HubertManne@piefed.social
      link
      fedilink
      English
      arrow-up
      4
      ·
      5 hours ago

      I like wireless and magnetic mainly because fucking up the cable is like the most common thing I might do to a device. not saying I do it all the time but its the most likley break to happen.

  • Otter@lemmy.ca
    link
    fedilink
    English
    arrow-up
    17
    ·
    7 hours ago

    You can see a CT scan of one of these

    https://www.techspot.com/news/105863-usb-c-cable-can-hide-lot-malicious-hardware.html

    • brachiosaurus@mander.xyzOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      5 hours ago

      damn i though they would use the type A connector because it’s bigger but it can be fit even into usb C

  • Bad_Engineering@fedia.io
    link
    fedilink
    arrow-up
    110
    ·
    12 hours ago

    You can now buy one for yourself online. https://shop.hak5.org/products/omg-cable

    • dance_ninja@lemmy.world
      link
      fedilink
      English
      arrow-up
      14
      ·
      edit-2
      6 hours ago

      Crazy that the USB-A housing is big enough for that. Makes me want to avoid anything that’s not C to C.

      Edit: someone pointed out there’s an option for C to C 💀

      • moody@lemmings.world
        link
        fedilink
        English
        arrow-up
        20
        ·
        8 hours ago

        C-to-C is even worse because Usb-C requires a chip in the connector, and you never know what that chip is capable of. Usb-A would only have a chip in it if it’s been tampered with.

        • dance_ninja@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          6 hours ago

          Yeah I was hoping the smaller form factor would make it difficult to fit in extra malicious hardware.

          • moody@lemmings.world
            link
            fedilink
            English
            arrow-up
            4
            ·
            2 hours ago

            This was the smallest Bluetooth chip back in 2017. I can’t even imagine what else they can fit into the form factor of a USB-C plug nowadays.

            • thallamabond@lemmy.world
              link
              fedilink
              English
              arrow-up
              2
              ·
              2 hours ago

              Released last year, TI MSPM0C1104

              The MSPM0C1104 is a 24 MHz Arm Cortex-M0+ based device with up to 16 KB of flash and 1 KB of SRAM. It has a 12-bit ADC with three channels, six GPIO pins, and typical communication interfaces like UART, SPI, and I²C. It is an ultra-low-power 32-bit MCU well suited for compact battery-powered designs.

              https://www.electronics-lab.com/texas-instruments-unveils-mspm0c1104-worlds-smallest-microcontroller-for-space-constrained-applications/

      • docandersonn@literature.cafe
        link
        fedilink
        English
        arrow-up
        4
        ·
        7 hours ago

        There’s a USB-C option for the active end.

    • Jessica@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      31
      ·
      11 hours ago

      That is amazing. The x-ray of it is kind of scary, honestly. That little chip could be all it would take to get into an air-gapped machine.

      • Bad_Engineering@fedia.io
        link
        fedilink
        arrow-up
        9
        ·
        9 hours ago

        There are a ton of different payloads that can be run on these, for everything from simple keylogging, to root access, to network backdoors. I’ve only recently gotten into pentesting but with something like this there’s no real limit to the damage that could be done with only a few seconds of physical access.

        • thejml@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          11
          ·
          8 hours ago

          Honestly, as a Systems/DevOps engineer it’s always been well know that if you have physical access, you have zero chance of security. Sure it might take more time if precautions were followed, but you will be owned eventually, that’s guaranteed.

          • Dubiousx99@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            7 hours ago

            This is one of our most frustrating fights I have with our security design reviewers. Effectively functionless mitigations that create extra obstacles for our service reps to deal with during troubleshooting. One example is our equipment is installed in access restricted areas, in a locked rack. We don’t need to disable unused Ethernet ports on our networking equipment that exists in a locked cabinet and it will take away our ability to repatch equipment to a different switch in the system to assist in troubleshooting.

            • Flowers Galore@lemmynsfw.com
              link
              fedilink
              English
              arrow-up
              1
              ·
              2 hours ago

              Let me guess, they do allow ai traffic from everyone and their mum for the sake of uhh… innovation?

        • Jessica@lemmy.blahaj.zone
          link
          fedilink
          English
          arrow-up
          2
          ·
          9 hours ago

          That is gnarly!

          • in_my_honest_opinion@piefed.social
            link
            fedilink
            English
            arrow-up
            2
            ·
            8 hours ago

            https://hackaday.com/tag/badusb/

      • Rooskie91@discuss.online
        link
        fedilink
        English
        arrow-up
        17
        ·
        11 hours ago

        Could?

  • 9point6@lemmy.world
    link
    fedilink
    English
    arrow-up
    91
    ·
    12 hours ago

    Not just the US government, anyone has been able to do this for years

  • in_my_honest_opinion@piefed.social
    link
    fedilink
    English
    arrow-up
    84
    arrow-down
    1
    ·
    12 hours ago

    You might be interested in the full Snowden leak

    https://github.com/iamcryptoki/snowden-archive

    • MnemonicBump@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      28
      ·
      11 hours ago

      Yeah, it’s scary how much people don’t remember/don’t know

      • chillpanzee@lemmy.ml
        link
        fedilink
        English
        arrow-up
        7
        ·
        7 hours ago

        And don’t care.

  • scala@lemmy.ml
    link
    fedilink
    English
    arrow-up
    2
    ·
    6 hours ago

    USB condom!

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 hours ago

      Fast charging won’t work without a proper connection

  • 「黃家駒 Wong Ka Kui」 | (aka: 鳳凰院 凶真 Hououin Kyouma)@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    22
    ·
    11 hours ago

    Pro Tip: Leave a unique mark somewhere on the cable so if someone switches it, you can tell it apart. Always check for the mark before you use the cable, every time.

    (Yes I actually do this, I’m paranoid)

    • Bunitonito@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      6 hours ago

      If you’re really paranoid you should buy all your stuff in a brick and mortar store. You’d have to be high up on a list for it to even be worth someone’s time, but intercepting a package and swapping the contents is pretty easy to do, typical Tuesday multi-agency gun ring bust for some postal inspectors

      • 「黃家駒 Wong Ka Kui」 | (aka: 鳳凰院 凶真 Hououin Kyouma)@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        ·
        6 hours ago

        My older brother is abusive, and I need precautions to be safe.

        That’s my threat model.

        I actually would rather run a phone with stock OS with verified boot, rather than LineageOS but with bootloader unlocked. Evil Maid from someone you know wanting fuck around with you is more scary to me than government tbh

        (I don’t have a pixel for graphene)

        Edit: Also these cables cost like $200 online from HAK5. My brother definitely can pull some shit if he tried. He’s in Computer Science in college.

        • okamiueru@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 hours ago

          Is it not possible to lock the bootloader again with LineageOS?

          • 「黃家駒 Wong Ka Kui」 | (aka: 鳳凰院 凶真 Hououin Kyouma)@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            1
            ·
            5 hours ago

            Only with a few rare phones… most phones just gets bricked if you attempt to lock it under a custom os because they don’t support custom keys.

            Pixel supports it, but I don’t have a pixel. (If I did I would just use Graphene lol)

            New is expensive

            and I really distrust the used market… feels very sketchy and it could have hidden damage that doesn’t manifest itself until the return window is already passed (if they even allow a return at all), also I have a paranoia about getting an IMEI that a criminal have used and then cops come knocking thinking its ME doing the illegal activity (cuz you know they do the “oops wrong address” thing often and they’ve shot people to death over it )

  • Zer0_F0x@lemmy.world
    link
    fedilink
    English
    arrow-up
    31
    ·
    12 hours ago

    We found out 15 years ago the hardware is probably older

  • 7rokhym@lemmy.ca
    link
    fedilink
    English
    arrow-up
    20
    ·
    11 hours ago

    USB condoms for charging exist for a reason.

    • okamiueru@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      5 hours ago

      Would limit higher power charging

      • Flowers Galore@lemmynsfw.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 hours ago

        That’s the tradeoff yes

  • quediuspayu@lemmy.dbzer0.com
    cake
    link
    fedilink
    English
    arrow-up
    9
    ·
    11 hours ago

    https://darknetdiaries.com/episode/161/

    There’s a darknet episode about these cables

Today I Learned@lemmy.world

til@lemmy.world

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !til@lemmy.world

What did you learn today? Share it with us!

We learn something new every day. This is a community dedicated to informing each other and helping to spread knowledge.

The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:

Rules (interactive)


Rule 1- All posts must begin with TIL. Linking to a source of info is optional, but highly recommended as it helps to spark discussion.

** Posts must be about an actual fact that you have learned, but it doesn’t matter if you learned it today. See Rule 6 for all exceptions.**



Rule 2- Your post subject cannot be illegal or NSFW material.

Your post subject cannot be illegal or NSFW material. You will be warned first, banned second.



Rule 3- Do not seek mental, medical and professional help here.

Do not seek mental, medical and professional help here. Breaking this rule will not get you or your post removed, but it will put you at risk, and possibly in danger.



Rule 4- No self promotion or upvote-farming of any kind.

That’s it.



Rule 5- No baiting or sealioning or promoting an agenda.

Posts and comments which, instead of being of an innocuous nature, are specifically intended (based on reports and in the opinion of our crack moderation team) to bait users into ideological wars on charged political topics will be removed and the authors warned - or banned - depending on severity.



Rule 6- Regarding non-TIL posts.

Provided it is about the community itself, you may post non-TIL posts using the [META] tag on your post title.



Rule 7- You can't harass or disturb other members.

If you vocally harass or discriminate against any individual member, you will be removed.

Likewise, if you are a member, sympathiser or a resemblant of a movement that is known to largely hate, mock, discriminate against, and/or want to take lives of a group of people, and you were provably vocal about your hate, then you will be banned on sight.

For further explanation, clarification and feedback about this rule, you may follow this link.



Rule 8- All comments should try to stay relevant to their parent content.

Rule 9- Reposts from other platforms are not allowed.

Let everyone have their own content.



Rule 10- Majority of bots aren't allowed to participate here.

Unless included in our Whitelist for Bots, your bot will not be allowed to participate in this community. To have your bot whitelisted, please contact the moderators for a short review.



Partnered Communities

You can view our partnered communities list by following this link. To partner with our community and be included, you are free to message the moderators or comment on a pinned post.

Community Moderation

For inquiry on becoming a moderator of this community, you may comment on the pinned post of the time, or simply shoot a message to the current moderators.

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 1.01K users / day
  • 2.1K users / week
  • 5.71K users / month
  • 12.8K users / 6 months
  • 59 local subscribers
  • 27.8K subscribers
  • 1.5K Posts
  • 39.5K Comments
  • Modlog
  • mods:
  • Rooki@lemmy.world
  • _MoveSwiftly@lemmy.world
  • Thekingoflorda@lemmy.world
  • DriftingDeep@lemmy.world
  • eric@lemmy.world
  • Decoy321@lemmy.world
  • BE: 0.19.15
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org