TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

WiFi Hides Inside a USB Cable

384 pointsby glaxabout 6 years ago

21 comments

psophisabout 6 years ago
About a month ago I found a similar device on aliexpress that has GPS and SIM card slot:<p><a href="https:&#x2F;&#x2F;www.aliexpress.com&#x2F;item&#x2F;1m-USB-Charging-Data-Cable-for-GPS-Locator-GPS-Positioning-Pick-up-Line-Tracker-Remote-Tracking&#x2F;32822576534.html" rel="nofollow">https:&#x2F;&#x2F;www.aliexpress.com&#x2F;item&#x2F;1m-USB-Charging-Data-Cable-f...</a>?
评论 #19205047 未加载
评论 #19207722 未加载
评论 #19207306 未加载
评论 #19205059 未加载
itissidabout 6 years ago
This is scary. I mean someone can just replace the cables in my house and my phones and computer would become infected. I can&#x27;t even imagine the headache this does for company&#x27;s cybersecurity practices.<p>A rogue janitor replaces the usb cables on some of the employees of a company that makes $INSERT_SUPER SECRET_TECH$ and done.
评论 #19204831 未加载
评论 #19204745 未加载
评论 #19205256 未加载
评论 #19212081 未加载
评论 #19205704 未加载
评论 #19205025 未加载
jchrisaabout 6 years ago
If you can do this for kicks, imagine what you can do with a budget.
评论 #19204834 未加载
评论 #19204818 未加载
Animatsabout 6 years ago
Naomi Wu reported on those last August.[1] There&#x27;s one on Amazon that uses GSM, but it&#x27;s 2G.[2]<p>[1] <a href="https:&#x2F;&#x2F;twitter.com&#x2F;realsexycyborg&#x2F;status&#x2F;1031903155414478848?lang=en" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;realsexycyborg&#x2F;status&#x2F;103190315541447884...</a><p>[2] <a href="https:&#x2F;&#x2F;www.amazon.com&#x2F;Jiusion-Listening-Surveillance-Quad-band-Lightning&#x2F;dp&#x2F;B06X42SGPY" rel="nofollow">https:&#x2F;&#x2F;www.amazon.com&#x2F;Jiusion-Listening-Surveillance-Quad-b...</a>
评论 #19205895 未加载
raphlinusabout 6 years ago
I&#x27;m wondering whether any of the Google security team will use this for their &quot;leaving tradition&quot; [1], or whether it&#x27;s considered cheating, just too easy.<p>[1]: <a href="https:&#x2F;&#x2F;twitter.com&#x2F;LeaKissner&#x2F;status&#x2F;1085624255381827584" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;LeaKissner&#x2F;status&#x2F;1085624255381827584</a>
评论 #19205283 未加载
miguelmotaabout 6 years ago
Here&#x27;s the announcement tweet with a video demonstration:<p><a href="https:&#x2F;&#x2F;twitter.com&#x2F;_MG_&#x2F;status&#x2F;1094389042685259776" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;_MG_&#x2F;status&#x2F;1094389042685259776</a>
entire-nameabout 6 years ago
I guess even some sort of &quot;signed device protocol&quot; will not work. An attacker can just create a device that guesses the device identifier (or whatever is used to create the signature). Then, the attacker device can just keep guessing until it gets it right. Chances are, some serial number or similar will be used for this, so continuous guessing is feasible.<p>Will the solution to this, then, be to have some sort of &quot;smart card enabled device&quot;? For example, assuming TOFU, you manually accept all device&#x27;s public keys (and all devices, including cables and stuff will have one of these). Then, the computer will have to verify all actions done by those devices by sending a challenge for each action. But this seems impractical and inefficient...<p>Perhaps physical security is the only way for this...
评论 #19204979 未加载
评论 #19205046 未加载
评论 #19205061 未加载
评论 #19210737 未加载
baroffoosabout 6 years ago
What is the wifi for? the only attack I can possibly see here is pretending to be a keyboard. And you don&#x27;t need wifi for that, you just need a pre programmed set of steps to set up remote control for the pc.
Timothycquinnabout 6 years ago
That hardware solution sans wifi could offer some interesting security solutions such as trusted bridge between any computer and your mobile phone. Can&#x27;t wait to see this torn down and hacked.
aussieguy1234about 6 years ago
so... that could be useful to penetrate secure facilities, like nuclear weapons bunkers&#x2F;reactors. A worker is sent a cable as a &quot;gift&quot; or has one substituted in by mail intercept for an actual order. Attacker waits outside in a van and controls things over wifi.
评论 #19205179 未加载
throw7about 6 years ago
what&#x27;s the attack? the website just drones on about a cable that, as far as i can tell, could just broadcast your keypresses over wifi.
评论 #19205078 未加载
评论 #19210748 未加载
ElijahLynnabout 6 years ago
Can someone confirm for me? This needs a nearby wifi network that is either open or has credentials too, correct?<p>The video appeared to have it connect directly to the phone or to the network they both were on.
评论 #19205175 未加载
fghtrabout 6 years ago
Another reason to use QubesOS, where usb devices are connected to a separate virtual machine without any networking. And any usb keyboards are only activated after a confirmation.
评论 #19207338 未加载
rhemaabout 6 years ago
Would a high voltage loop, for breaking components, be a good solution to an attack like this? Like, fry the electronic components to verify it&#x27;s just plain metal on the insides?
评论 #19204945 未加载
评论 #19205517 未加载
评论 #19205104 未加载
评论 #19206656 未加载
woodrowbarlowabout 6 years ago
the cable is cool, but i&#x27;m more excited to read about his PCB manufacturing process. he built those tiny boards on a desktop CNC machine!
jayfluxabout 6 years ago
Does it just connect to the first WiFi which is t password protected? I’m assuming it’s useless if there’s no open WiFi about?
评论 #19204849 未加载
评论 #19204821 未加载
netwanderer3about 6 years ago
Info sec industry is a rabbit hole. Just ask Jeff Bezos.
评论 #19207436 未加载
emilfihlmanabout 6 years ago
Any links to schematics and code?
belleroseabout 6 years ago
Huh, so all it takes is someone to break into your home when you&#x27;re gone and swap a cable. Seems like privacy doesn&#x27;t really exist for people who truly need it. Unless they&#x27;re not using any technology.
评论 #19207142 未加载
评论 #19205080 未加载
评论 #19207110 未加载
bradgesslerabout 6 years ago
Are their third party OS extensions for macOS, like Little Snitch, that act as a firewall for USB-C devices?<p>It’s just crazy to me that plugging my Crapbook Pro into a USB-C power brick could do all sorts of bad to my computer when all I need is power.
userbinatorabout 6 years ago
<i>The construction of this device is quite impressive, in that it fits entirely inside a USB plug</i><p>The level of miniaturisation is not all that impressive, these have been around for a while:<p><a href="https:&#x2F;&#x2F;www.amazon.com&#x2F;Edimax-EW-7811Un-150Mbps-Raspberry-Supports&#x2F;dp&#x2F;B003MTTJOY" rel="nofollow">https:&#x2F;&#x2F;www.amazon.com&#x2F;Edimax-EW-7811Un-150Mbps-Raspberry-Su...</a><p>There&#x27;s no mention of using the rest of the cable as the antenna, since in my experience the above tiny adapters have an equally tiny antenna and thus poor reception.
评论 #19204759 未加载
评论 #19204785 未加载
评论 #19204835 未加载
评论 #19204739 未加载
评论 #19204760 未加载