I wouldn’t give this cable to my worst enemy - O.MG Cable

Поделиться
HTML-код
  • Опубликовано: 30 сен 2024

Комментарии • 3,3 тыс.

  • @LinusTechTips
    @LinusTechTips  Год назад +194

    You know what else is less than the price of an LTT Backpack? A FREE weekend of Crusader Kings 3 starting May 11th. Build your dynasty at: lmg.gg/CK3CS

    • @justaweeb14688
      @justaweeb14688 Год назад +19

      “All for less than a backpack from Ltt store” that doesn’t really give you a good idea lol

    • @zjemueller6643
      @zjemueller6643 Год назад +1

      nope

    • @costafilh0
      @costafilh0 Год назад +2

      Nah

    • @charlotteinjp
      @charlotteinjp Год назад

      A while back I picked up a micro-usb charging cable in a parking lot before this really became a hot topic and considering my extensive amount of micro-usb cables I can't remember which one it is to get rid of it. Should I be worried? PS: This was like 4yrs ago

    • @cal298
      @cal298 Год назад

      no

  • @mrgallbladder
    @mrgallbladder Год назад +10088

    To be fair, flipper zero already looks like a happy meal toy.

    • @WiRA_Cinematic
      @WiRA_Cinematic Год назад +85

      When I first saw the Flipper Zero, I thought it was some sort of Tamagotchi and fidget toy combined....

    • @cepheusclips
      @cepheusclips Год назад +43

      Yeah, but considering that this cable is about $120 and the Flipper zero costs about $400, I'd say that already makes the flipper zero a no go for most nefarious actors.

    • @Eyeball1975
      @Eyeball1975 Год назад +12

      To be faaaaiiirr.

    • @Apollo-Computers
      @Apollo-Computers Год назад +21

      @@cepheusclips you would be highly surprised.

    • @ToxicMothBoi
      @ToxicMothBoi Год назад +2

      Also built like one except for the internals lmao

  • @PinkDreemurr
    @PinkDreemurr Год назад +4435

    At this point im 99% convinced these security videos are the LTT equivalent of security awareness training after the hack.

    • @Kaotix_music
      @Kaotix_music Год назад +292

      To be fair he talks so much about computers, but very rarely talks about cyber security. I do cyber security on the side and people find it so scary how easy it is to hack anyone today. Security went the opposite, it never got better…it got way worse.

    • @cyko5950
      @cyko5950 Год назад +34

      at least this doesnt have the soulless coporate jingle

    • @ticenits1926
      @ticenits1926 Год назад +16

      It's shilling, these are all just thinly veiled advertisements for products

    • @crackdog1914
      @crackdog1914 Год назад

      @@ticenits1926 can you shut up please? no one wanted your input.

    • @DanielFerreira-ez8qd
      @DanielFerreira-ez8qd Год назад +116

      @@ticenits1926 "shilling" he says. Yeah I love shilling for security knowledge. STAY SAFE GUYS, I'M BEING PAID TO TELL YOU IMPORTANT INFORMATION

  • @RuiSilva450
    @RuiSilva450 Год назад +197

    Mike created the perfect ecosystem.
    1. Create the problem
    2. Create the solution
    3. Profit

    • @justsomething0
      @justsomething0 2 месяца назад +1

      Maybe he worked at apple?

    • @izzdaboss
      @izzdaboss 28 дней назад

      The Hegelian dialectic

    • @blossmctoss
      @blossmctoss 13 дней назад

      Maybe works for mossad 🤔exploding pagers

  • @nicolaicornelis2853
    @nicolaicornelis2853 Год назад +3306

    As someone who recently sat awake all night, naked, trying to log someone else out of their RUclips account, I'm sure Linus loves that this tool exists.

    • @richieqs7789
      @richieqs7789 Год назад +133

      🍓🍓🍓

    • @duckers0123
      @duckers0123 Год назад +10

      Well done

    • @ToxicMothBoi
      @ToxicMothBoi Год назад +115

      I hope the being naked part was needed for logging out

    • @B3RyL
      @B3RyL Год назад +39

      I'm pretty sure that's the reason he's doing a video on hacking tools in the first place. Awareness of the threat is the first step to combating it.

    • @pcmasterracetechgod5660
      @pcmasterracetechgod5660 Год назад +9

      I don't understand the point of these videos, who just picks up random ass cords or USB sticks and uses them? Even without these risks existing I wouldn't do that have common sense people

  • @wisteela
    @wisteela Год назад +2345

    I love that he had to create a device to detect his own cables.

    • @flameshana9
      @flameshana9 Год назад +119

      Totally had to. And had to sell these for a lot of money

    • @wisteela
      @wisteela Год назад +124

      @@flameshana9 The high price keeps them out of the hands of many. Good thing.

    • @O.MG-MG
      @O.MG-MG Год назад +30

      @@wisteelathere is more truth to that than most people realize. I have several cables that were found in the wild. They are all… let’s just say very behind.

    • @NezzConstantine
      @NezzConstantine Год назад +82

      Create problem, sell solution :p

    • @martin0499
      @martin0499 Год назад +5

      He made his own Kryptonite

  • @one_of_a_duo
    @one_of_a_duo Год назад +419

    Would be somewhat tempted to plant a cable that just opens notepad and warns against using random cables if not for the price.

    • @_____alyptic
      @_____alyptic Год назад +29

      That would be hilarious if you could catch someone's reactions

    • @LonneLpp
      @LonneLpp Год назад +80

      Plant a cable that opens a notepad to warn against random cables & in the background have their webcam open proceeding to download the short video file of them reading that; finally opening the video to themselves reading. This would be a SHOCKER and great content hahaha

    • @kennythompson9682
      @kennythompson9682 Год назад +15

      @@_____alyptic Make the first line _"SAY CHEESE!"_ and make it take a picture with flash and shutter sound on and send you the picture 🤔😂

    • @AlexVanChezlaw
      @AlexVanChezlaw Год назад +3

      That's very reddit of you, have some gold stranger!

  • @jediguy634
    @jediguy634 Год назад +1784

    As someone who works in a large company IT department. Mike has a good point, most cyber criminals don't need to go through that kind of hassle. Its staggering at the amount of people (who swear they didnt click anything) get their work computers infected that i have to pull, wipe, and re-image. Our company cyber security team also sends out test phishing emails randomly and it always catches people.

    • @alexoja2918
      @alexoja2918 Год назад +15

      I find it very hard to get a work computer infected with anything, can't do shit anymore 😂

    • @TheManelich
      @TheManelich Год назад +33

      it's like stopping a boat made of Swiss cheese from sinking there will be always someone doing the wrong thing at the wrong time.

    • @tzxazrael
      @tzxazrael Год назад +89

      "I DIDN'T CLICK NOTHIN!!"
      ..."Sir, I am right here beside you. I just watched you click seven differnt things just because they had blinky pictures."
      "I DIDN'T CLICK IT!"
      ..."Sir, I can -hear- your mouse clicking."

    • @dragoslove
      @dragoslove Год назад +28

      I know better and accidentally clicked a phishing link recently. Fortunately it only went to a fake login page and didn't download anything, but it was a pretty scary couple minutes.

    • @OriflammeGaming
      @OriflammeGaming Год назад +6

      I had a laptop that was in the middle of being reimaged and got infected 💀 Defender caught it but it was strange nonetheless. Mimikatz.

  • @cheeseisgreat24
    @cheeseisgreat24 Год назад +1621

    I feel like $100 per cable is already incredibly cheap for someone looking for a big payday by infiltrating some organization

    • @adrianvd6940
      @adrianvd6940 Год назад +161

      Not only that, people backward engineer this stuff all the time, so I could see a slew of people making "copies" of this tech, and it not only being cheap but unknown because they will only use it for themselves

    • @moji3812
      @moji3812 Год назад +2

      Yeah

    • @chiranjeevsahoo4960
      @chiranjeevsahoo4960 Год назад +75

      not just for an organization, but for an average joe with a vendetta as well. It may be expensive for throwing it on the road or using it for general attacks like in a hotel. It's perfectly viable for a targeted attack. I can see a disgruntled ex slipping it in.

    • @horntx
      @horntx Год назад +45

      Sending an email costs 0$ though and is more likely to work, less likely to be traced back to you (if you know what your doing), and is likely to give you more access.
      Walking out with a computer or hard drive costs 0$ and is more likely to work and much less skilled, and if you are vulnerable to physical attacks someone could pull it off.
      Plugging in a normal keyboard costs 20$ and while there are some things you can't do with it, (remote connection) you could still do damage.
      I love it when LTT covers these tools because they are fun to play with. But I am much more worried about phishing as an attack vector than physical attacks with tools like this. These tools are not going to shift how we defend networks because they are simply slightly flashier more advanced versions of existing threat vectors.

    • @kebien6020
      @kebien6020 Год назад +5

      Yeah, but sending a couple hundred of phishing emails and text messages is cheaper, easier and safer for the attacker. (safer in terms of remaining anonymous).
      You'll only get to the fancy stuff, like physically infiltrating the place and leaving a malicious cable lying around, once all of the boring and cheap stuff is exhausted.

  • @JigglypuffTutorials
    @JigglypuffTutorials Год назад +211

    Can totally see in a few years amazon or ali express being full of cables like
    this if these exploits aren’t taken care of. Maybe O.M.G is doing the right thing.

    • @bcostin
      @bcostin Год назад +21

      Unless Amazon cleans up their sloppy practices that's definitely going to happen. It probably is already happening.

    • @variablenine
      @variablenine Год назад +8

      Not just online shopping but I could see this getting planted in places like gas stations as well. Scary stuff.

    • @hollytaylor5327
      @hollytaylor5327 Год назад +2

      By providing the threat? The link is in the description. The hypocrisy no one is seeing is astounding.

    • @variablenine
      @variablenine Год назад +4

      @@hollytaylor5327 better to make something like this, be open to everyone about how it works and let it be researched than for someone else to make this with terrible intentions and blindside tons of businesses

    • @Outwardpd
      @Outwardpd Год назад +9

      @@hollytaylor5327 They make these products for actual security testing purposes as they explained in the video. But yes by making them generally available you're putting the threat out into the real world which means companies are forced to take the threat seriously. Besides you can't just buy these and go on a crime spree, even buying these products absolutely puts you on a list.

  • @leodellore5360
    @leodellore5360 Год назад +336

    It is a nuclear bomb

  • @yusinwu
    @yusinwu Год назад +102

    "We'd better off learn about now while it's expensive, then later when it's cheap and it's too late."
    Well said, so well said

    • @theairaccumulator7144
      @theairaccumulator7144 Год назад +7

      China has already reversed this from the day it came out, we'll see $10 versions in a few months.

    • @evolicious
      @evolicious Год назад +1

      lol, no. These sorts of tools can be made for $10. It's been cheap for years. It's not a real threat becasue these tools are not useful for actual targeted attacks.

    • @evolicious
      @evolicious Год назад +1

      @@theairaccumulator7144 It's been $10 for years already. Look at what Arduino offers, lol.

    • @yusinwu
      @yusinwu Год назад

      @@theairaccumulator7144 these Chinese stuff works but they usually don't come with comprehendible docs, so I guess we're fine for now

  • @ErikTheAndroid
    @ErikTheAndroid Год назад +279

    Security is one of the few fields where "spreading awareness" is actually a valid and worthwhile thing. These attacks exist whether we like it or not, so it is better to know about them so we can defend against them.

    • @paulknight5018
      @paulknight5018 Год назад +7

      Its also a field that can't be measured you cannot tell how many attacks awareness prevents.

    • @AdhamOhm
      @AdhamOhm Год назад +9

      My work CONSTANTLY reiterates never using the same password for your personal accounts as for your work accounts, to never giving your work passwords to phishers, to never using your work email to sign up to shady sites. Yet employees continue to do it.

    • @evolicious
      @evolicious Год назад +1

      100%. The only real attacks are social engineering. Remote hacks and such are hollywood tropes.

    • @caelestigladii
      @caelestigladii Год назад +1

      @@AdhamOhmClearly not a problem with the “law” then.

    • @GRBtutorials
      @GRBtutorials Год назад +3

      Few? What fields are there where spreading awareness is bad?

  • @Grot3sque
    @Grot3sque Год назад +492

    15 years ago my brother warned me about this stuff.. Ever since i've never used public charging and only use my own brick and cable xD sometimes a brother with a tinfoil hat is a good thing. Miss him tho

    • @Secret_Takodachi
      @Secret_Takodachi Год назад +40

      its the worst part about being a cynic. You don't want to be right. But you know you are. Your brother sounds like a wise man. As someone with 3 younger brothers to protect (even if they don't realize they still need it) you have my respect from one brother to another.

    • @jarryjackal3827
      @jarryjackal3827 Год назад +3

      @@Secret_Takodachi if his brother said that 15 years ago he isn't wise. Its probably the first thing that came true that he said.

    • @GasquatchGutty
      @GasquatchGutty Год назад +50

      @@jarryjackal3827 your comment is just as presumptuous as the one you’re criticising

    • @peachulemon
      @peachulemon Год назад

      I wonder how much data can be transferred when just charging? Android phones ask before data transfer over usb would that not prevent some of from accessing data?

    • @Sonar90
      @Sonar90 Год назад +19

      ​​@@jarryjackal3827 hacking has been around far longer than the early 2000s. Just cause a method is widespread enough to get onto LTT now doesn't make it new. Don't you remember those good ol days when they warned ya not to put strange CD's into your disk drive, or those sketchy floppies with some guys sick new beats from the subway?

  • @asj3419
    @asj3419 Год назад +22

    The NSA apparently had these back in 2008 (according to the ANT catalog leaked in 2013). COTTONMOUTH-I was a device that could load malware and act as a wireless bridge (for subverting airgaps) while being disguised as a regular USB cable connector. The price for making these things must have a dropped a bit, since the listed unit price was 20 300 USD.

    • @andorexurix2491
      @andorexurix2491 Год назад +6

      It's expected for intelligence agencies to have access to these and more. But for normal people to, this is gonna be interesting to watch unfold.

    • @the_undead
      @the_undead Месяц назад

      Generally, whenever consumers get access to cutting Edge technology, governments and militaries have likely had access to something with similar or Superior capability for at least 4 years. Whether or not they used it as a different question like for example, I don't think any military has been using folding screens because they're just way too fragile, but I suspect if for example, the US military had a use case they probably could have had them back in 2005

  • @bobthebuilder7059
    @bobthebuilder7059 Год назад +562

    2:43 I appriciate the editor using different TF2 payloads as a way to show it can carry multiple.

  • @hehebruh893
    @hehebruh893 Год назад +1243

    Mike creating a problem and also providing a solution is a genius way to sell stuff

    • @itsyaboikirbo
      @itsyaboikirbo Год назад +109

      doesnt get more textbook than that, well played to him

    • @sctsmith
      @sctsmith Год назад +65

      That's the governments way.

    • @silent-killer429
      @silent-killer429 Год назад

      Still a pos

    • @castform57
      @castform57 Год назад +47

      Technically it could be classified as racketeering, but there are some qualifiers for that.

    • @Ikxi
      @Ikxi Год назад +19

      Well, it's just a detector. Not a full blocker, so, no solution really lol
      Could still just instantly execute scripts.

  • @JamesTM
    @JamesTM Год назад +120

    My biggest worry about these is how easy it is to inject fake or knock-off items into Amazon's listings or inventory. It's entirely plausible that an attacker could mock up a few of these to look like some reputable brand and then sell them on Amazon to unsuspecting people. I've gotten fake stuff from "Ships and Sold by Amazon" listings, so it's not just a matter of avoiding dodgy listings.
    Too expensive to be worth it now? Probably. But that won't last long.

    • @flameshana9
      @flameshana9 Год назад +8

      People are saying the chips only cost a dollar. So there's nothing to stop them from it.

    • @housemouseshorts
      @housemouseshorts Год назад +14

      allready made its way into best buy disgused as legit products. People buy a real one. replace it with this then return the product to the store.

    • @nobodynoone2500
      @nobodynoone2500 Год назад +2

      @@flameshana9 Pretty sure its just an esp32 or something.

    • @Souchirouu
      @Souchirouu Год назад +8

      I expect that someone like Apple or Samsung don't make their own cables in house. If the company they buy these from wanted they could include cables like this with every smartphone these companies sell. Then wait until their cables are everywhere or until they are found out and then ransom every device.

    • @TheNpcNoob
      @TheNpcNoob Год назад +2

      @@Souchirouu Thank you for that idea…

  • @daviddamasceno6063
    @daviddamasceno6063 Год назад +479

    Not sure if there is a phobia name for "fear of cables" but I'm sure we're gonna need one.

    • @hubertnnn
      @hubertnnn Год назад +44

      Its called Apple.
      Though it could just be phobia of mini-jacks

    • @MotoDash1100
      @MotoDash1100 Год назад +19

      Cablaphobia
      Pronounced Kay-blah-phobia

    • @nightyk6
      @nightyk6 Год назад +9

      I'm just glad I decided to keep those 2 boxes full of cables for the last 20 years of my life!
      ... who am I kidding, it's more like 4 crates.

    • @flameshana9
      @flameshana9 Год назад +2

      @@MotoDash1100 I lol'd. Thank you.

    • @dassault7618
      @dassault7618 Год назад +2

      @ChillingSpree give it two and it’ll be another gender lol

  • @uplink-on-yt
    @uplink-on-yt Год назад +18

    One day we'll encrypt USB with keys that we upload to devices ourselves. Setting up a keyboard, mouse, USB stick, etc. will become crazy complicated just to keep bad guys out. And they'll still find a way.

  • @ScorelessPine
    @ScorelessPine Год назад +325

    I almost worry that people are going to try and slip these into things like Ebay or Amazon listings or returns, they look good enough to be official and nobody would think twice about using the charging cable that came in the box with their new phone.

    • @GeneralNickles
      @GeneralNickles Год назад +48

      Yeah, but anyone trying to save money by buying a phone on ebay probably isn't rich enough to be a worthy target of such an attack. It would largely be a waste of the attackers time and money more often than not.

    • @Khronogi
      @Khronogi Год назад +85

      ​@@GeneralNickles I disagree. Scammers gonna scam.

    • @beerfarmer1828
      @beerfarmer1828 Год назад +31

      You didnt check the price of the cable. Dont be stupid, no scammer will spray and pray with it.

    • @GeneralNickles
      @GeneralNickles Год назад

      @@Khronogi yeah, but scam what, though?
      If they put ransomware on some random middle schmuck's computer, then said schmuck would probably just go get a new computer. Stealing banking credentials isn't gonna accomplish much, because they probably don't have much to steal in the first place.
      It would almost always end up being a waste of time and money.

    • @oryxland3994
      @oryxland3994 Год назад +47

      @@Khronogi It's $120 USD, no scammer is going to pay that much in the hopes that some random person will use it and have anything worth stealing. Scammers succeed by casting a wide net that doesn't cost them much if anything, like phishing emails, not by by spending over $100 per target.

  • @Neoxon619
    @Neoxon619 Год назад +1278

    And that’s why I always carry my own cables. If anything, this video couldn’t be timed better since I’m headed downtown for the day & had to pack some chargers.

    • @danyal_assi
      @danyal_assi Год назад +5

      Toileg

    • @josephcronin2965
      @josephcronin2965 Год назад +1

      I like how you say"against"

    • @itIsI988
      @itIsI988 Год назад +9

      @@danyal_assi Ratio

    • @josephcronin2965
      @josephcronin2965 Год назад

      Wow with that price it may make him a lot of money

    • @Ladioz
      @Ladioz Год назад +1

      Why bother taking electronic devices with you? Go there without them, keep them at home. You'll be 100 times happier

  • @Neavris
    @Neavris Год назад +16

    The name of the NSA implant this is inspired from is called COTTONMOUTH. A USB cable with wifi remote control in the type-A end. It was in the TAO catalog released in late 2013 iir.

    • @xenostim
      @xenostim 3 месяца назад

      WHAT this is awesome. thank you, non-descript commenter

  • @savagepro9060
    @savagepro9060 Год назад +270

    Linus: I wouldn’t give this cable to my worst enemy
    Also Linus: but whoever hacked us is an exception!

    • @KrillinInTheNameOf
      @KrillinInTheNameOf Год назад +8

      Linus: But I'll happily give it an incredible amount of free advertising!

    • @alexturnbackthearmy1907
      @alexturnbackthearmy1907 Год назад +3

      @@KrillinInTheNameOf So you prefer to be NOT informed and caught in panic wave or be the victum when shit hits the fan?

    • @KrillinInTheNameOf
      @KrillinInTheNameOf Год назад +4

      @@alexturnbackthearmy1907 I'm not sure what this has to do with being opposed to him promoting actual products. He could warn people about the risks of these types of devices without showing every wannabe hacker exactly where to get a product like this.

    • @Lizlodude
      @Lizlodude Год назад +5

      @@KrillinInTheNameOf I mean I searched for "hacking USB cable" and got the OM.G and Ninja as the first results, with a public storefront, so I don't think that barrier to entry is really valid.

  • @Checkmate_Edits
    @Checkmate_Edits Год назад +1296

    "It makes flipper zero look like a happy meal toy"
    For some reason I can't even explain why I laughed so hard there 😂

    • @smartydude727
      @smartydude727 Год назад +6

      Lol me too

    • @WSAnderson
      @WSAnderson Год назад +33

      .... because the flipper zero DOES look like a happy meal toy? I don't think the cable has anything to do with that...

    • @FlyboyHelosim
      @FlyboyHelosim Год назад +11

      Flipper Zero does already look like a Happy Meal toy though. LOL

    • @EdgyShooter
      @EdgyShooter Год назад

      The video says uploaded 1 hour ago with your comment being made two hours ago 😅

    • @Checkmate_Edits
      @Checkmate_Edits Год назад

      @@WSAnderson Exactly LOL

  • @secret-alias
    @secret-alias Год назад +18

    This sounds like a stress test that went on at LMG where they planted a cable that got used and then there would've been a seminar around 'security in the workplace', followed by 'That would make a great video' 😂😂

  • @CarputingYT
    @CarputingYT Год назад +1163

    I never thought we'd need this, but here we are - I think "Plug and Play" in Windows needs to be updated to have some sort of hardware security or something, god knows how that could ever be figured out, goodluck Microsoft

    • @danyal_assi
      @danyal_assi Год назад +7

      Toilet

    • @heyspookyboogie644
      @heyspookyboogie644 Год назад +109

      It’s not possible. A computer is useless without some way to interact with it. If a person can interact with it, then anything that emulates a person interacting with it can too.
      The best that can be done is a cat and mouse game trying to detect exploits, etc. but that will never stop someone being able to go to a website and download software or run software written on the machine itself.

    • @gredystar8333
      @gredystar8333 Год назад +41

      I mean, it would be nice to have the option. but on the other hand, these devices can mask themselves as pretty much any device out there. so even if windows gave you an alert or something that the device named "xx" was connected and you need to accept a prompt to continue, this could just name itself the same as the device and most people would not ever see anything wrong with that.

    • @ali32bit42
      @ali32bit42 Год назад +33

      it would likely mean making billions of USB devices uselsess and obsolete since they dont have any way to verify themselves to the new security system

    • @user-le8ul4nr5t
      @user-le8ul4nr5t Год назад +36

      Devices could send an "evil bit" to the host to indicate they have malicious intent. Something similar has been proposed for internet packets on april 1st 2003.

  • @Samanthayeoqy
    @Samanthayeoqy Год назад +458

    I would much prefer someone selling it publicly versus them selling it privately.
    The flipper and OMG cable is making it known that this could happen and we could learn to defend ourselves. Way better than not knowing till after the fact.

    • @evolicious
      @evolicious Год назад +11

      They are not a real threat regardless. Just pen testing toys for basic netsec education.

    • @MotoX2official
      @MotoX2official 8 месяцев назад +3

      Realistically nobody is going to go through that much effort for a normal persons info, this would be much more useful to use against companies

    • @the_undead
      @the_undead 8 месяцев назад +1

      People who despise these devices existing don't understand how dangerous this kind of stuff is or physical security for that matter, there are attacks that have existed for over 70 years (and when I say have existed I mean there is absolutely no way the manufacturer did not know for that amount of time) that are still absolutely doable on relatively high-end locks today. The design flaws that allow these kinds of devices (mostly the flipper zero but the omg cable a little) will not be patched if there is not outrage at the design flaw

  • @zachend6218
    @zachend6218 Год назад +4

    What happened to the Google pixel stream???

  • @jonogrimmer6013
    @jonogrimmer6013 Год назад +133

    Most things are less than the LTT backpack 😂

    • @mahdi9064
      @mahdi9064 Год назад +4

      for real 😂

    • @thebestmaidens
      @thebestmaidens Год назад +3

      My thoughts exactly

    • @benwu7980
      @benwu7980 Год назад +5

      another thing that's cheaper than that backpack...is this segue

    • @MotoDash1100
      @MotoDash1100 Год назад +3

      Kriega R30: $275 USD and made from abrasion resistant textiles, has a fantastic system for distributing weight and staying on, as well as 30 liters of space and having a massive 100% Waterproof compartment.
      Linus: how 'bout none of that BUT it's $25 USD less expensive.

  • @levylok333
    @levylok333 Год назад +230

    Thank you for teaching us about things like this! I'm a computer salesman, and a lot of people come to me with cybersecurity and ask for my knowledge. So when it comes to things like these, you said it first, it's better know about it as early as possible to prevent people of having these encounters.
    Have a nice day
    Levy

    • @alexmerand288
      @alexmerand288 Год назад +2

      couldnt agree more

    • @noth606
      @noth606 Год назад

      People are dumb, it can't be fixed... I could grab a USB stick, load up an autorun attack tool on it, and almost everyone would pick it up off the street and plug it in. By making it throw a popup saying it's not compatible and to try another computer I could get them to infect everything they have access to. I'm in IT and security now, because I used to wear a different hat before and know how it's done, there is a near infinite mountain of attack vectors to use and the way to protect against them is isolation mostly.

  • @epicdrew1634
    @epicdrew1634 Год назад +23

    Please do more videos like this, so people can learn more about it.

    • @evolicious
      @evolicious Год назад

      It's misinformation based on a bad understanding of real world netsec, and shilling to sell a product. LTT are the last people to give out netsec advice.

  • @LaczPro
    @LaczPro Год назад +325

    Man, the ending about those getting cheaper, that gives the chills.
    Love to see security content like this on the channel. It's way more important than people think it is.

    • @brianwest2775
      @brianwest2775 Год назад +1

      Once one person does it, then the copycats will try cheaper versions, but perhaps not as full featured.

    • @chiranjeevsahoo4960
      @chiranjeevsahoo4960 Год назад +5

      It's not viable for general attacks but perfectly viable for a targeted attack. If someone wants to harm you they will harm you, money is not a problem for those cases.

    • @evolicious
      @evolicious Год назад

      These devices pose zero threat in the real world. Don't buy into LTT's fear mongering. They are selling a product.

    • @evolicious
      @evolicious Год назад

      @@brianwest2775 Devices like this have been $10 for years, it's nothing special or new. They are useless in the real world.

    • @evolicious
      @evolicious Год назад +1

      @@chiranjeevsahoo4960 Targeted attacks need to be far more sophisticated for a remote attack. Anything worth while is going to need a physical compromise to be worth using a remote tool. Which is pretty much non-existent for years already.

  • @DoubleSmackJacksSmackAttack
    @DoubleSmackJacksSmackAttack Год назад +328

    Our company's IT group does bi-annual "USB thumb drive left in the parking lot" tests and our staff has failed for the last 5 years LMAO this cable is definitely the least of their problems.

    • @Secret_Takodachi
      @Secret_Takodachi Год назад

      sounds like your company is a PRIME cable target. People still plugging in random USBs is a "HUGE STUPIDITY HOLE"
      If they're that vulnerable to USB infiltrations I'd honestly feel very confident that if I dropped a little over a grand on ten of these in your company parking lot I could make 100x time my money back through a combination of personal blackmail & company hacks. but hey im just a ten year old kid or a 40 yo virgin trying to sound mean and scary right? yeah probably i mean... more than likely? or maybe.... lol this sh*t isn't hard or expensive (relatively) its just obscure. Once you understand the principles the primary limits are your own creativity and ethical standards.

    • @JiorujiDerako
      @JiorujiDerako Год назад +75

      @@Jake420 Why spend $100+ on an attack cable when the company can be infiltrated with some $5 USB sticks, is the point I think they were trying to make :P

    • @fermitupoupon1754
      @fermitupoupon1754 Год назад +38

      I worked for a chemical company on a project and all of the production control machines were air gapped, used PS2 keyboard and mouse and had all of their USB ports stuffed with hot glue.
      Transferring data to those machines was done with special "data caddies" which were basically USB drives with a non-standard connector.

    • @TruthDoesNotExist
      @TruthDoesNotExist Год назад +6

      if they start writing people up and cutting pay and benefits every time they fail the test they will gain IQ points real quick

    • @sgtkabukiman9411
      @sgtkabukiman9411 Год назад +4

      So, where do you work?
      Kidding. Saw a man in the street thing where they offered people candy for their workstation password. So many just handed it over no probs.

  • @myhandlewastakenandIgaveup
    @myhandlewastakenandIgaveup Год назад +144

    I will be bringing both my own charging brick and cable everywhere going forward. The world is getting scary.

    • @HeathHol2012
      @HeathHol2012 Год назад

      No I don't fucking care

    • @resneptacle
      @resneptacle Год назад +13

      Always has been

    • @xwiick
      @xwiick Год назад +6

      @@resneptacle yup nothings really changed just method

    • @Call_Me_David
      @Call_Me_David Год назад +9

      ​@@xwiick Yep. They've been warning about using public USB charging stations for almost as long as they've been a thing.

    • @CraftingCake
      @CraftingCake Год назад +1

      Android phones block data transfer until you explicitly allow it.
      Unless you’re running Stone Age Androids, I don’t see an issue.

  • @sorianodan
    @sorianodan Год назад +12

    New fear unlocked, thank you linus!!

  • @vapeymcvape5000
    @vapeymcvape5000 Год назад +5

    0:42 you charge $250 for a fucking backpack?

  • @Flynn217something
    @Flynn217something Год назад +332

    I thought about something like this the moment I started seeing "public use" cables/charging stations in airports, malls ect. and kept always bringing my own cable and brick. Friends and family said I was paranoid/crazy, to them I smugly tip my tin foil cap 😏

    • @benwu7980
      @benwu7980 Год назад +29

      Oddly reminds me of the early days of free wifi access points at places like coffee shops etc and my warning to friends / family of how numerous the ways were that they can be malicious

    • @mikemcmike6427
      @mikemcmike6427 Год назад +9

      Wait til they start replacing the power plugs then you screwed

    • @HeroRareheart
      @HeroRareheart Год назад +7

      I feel like these are probably similar to credit card skimmers. They are probably pretty abundant but the chances that we as an individual will encounter one are low.

    • @mrmoosetachio
      @mrmoosetachio Год назад +6

      @@mikemcmike6427 hence the adapters for power only that block the data channels on the cords

    • @poochyenarulez
      @poochyenarulez Год назад +2

      The odds of someone using this on random nobodies at the airport is REALLY low.

  • @MinistryOfGeeks
    @MinistryOfGeeks Год назад +192

    If some random coder dude is releasing these at a reasonably accessible price, you can bet these have already been around for a while in a more secretive manner. Governments and other various agencies have likely been using these for years. At least now the public is aware that these are, in fact, a real tangible thing.

    • @flameshana9
      @flameshana9 Год назад

      Pretty sure spy movies have been using these for the past half a century.

    • @WackoMcGoose
      @WackoMcGoose Год назад

      And the fact that the FBI is willing to _tell people this is a thing_ is a sign that to them, this method of exfiltrating data and hacking stuff is already *_obsolete_* by Three Letter Agency standards. Why spill the beans on a technique you're still actively using to spy on people?

    •  Год назад +25

      Yeah in my eyes what this guy is doing is making this accessible to security researchers and pen testers so companies etc can figure out how to defend themselves from it, rather than really creating a new attack vector or anything of the sort

    • @MCSteve_
      @MCSteve_ Год назад +12

      Yes this type of device has existed for many years, the company behind the usb rubber ducky has been around since 2005. Awareness is just bad, they've clearly made their point to the negligence of certain enforced security. In security, the biggest vulnerability to anything is physical access, with the right tools you can obtain anything. This is not just technology of course. Honest attackers are creative and sneaky who can be reasonably discouraged. Attackers with sledge hammers also exist.
      Keep your important belongings safe!

    • @Neavris
      @Neavris Год назад +10

      The name of the NSA implant this is inspired from is called COTTONMOUTH. It was in the TAO catalog released in late 2013 iir.

  • @DooMRunneR
    @DooMRunneR Год назад +5

    People called us paranoid when we rolled out centralized authentication of USB devices in our company 😂

  • @ThisMarv
    @ThisMarv Год назад +221

    In regards to juice-jacking, I miss the micro USB cables we had at Google, by default they were charging only and had a physical switch to enable the data lines of the cable if you needed to transfer data. Sadly they never made USB-C versions

    • @sylviam6535
      @sylviam6535 Год назад +10

      There are type A charge only USB adapters. You could use one of those with a tape C to type A adapter. You’ll probably lose charging speed, but at least you can use it in an emergency.

    • @andybrice2711
      @andybrice2711 Год назад +21

      It occurs to me that using USB for charging, data, and input is actually quite a security flaw. I know some large companies just disable USB drive support on all computers. Now I see why. Perhaps SD cards are actually safer, because they can only be storage.

    • @sylviam6535
      @sylviam6535 Год назад +16

      @@andybrice2711 - It’s more serious than data. USB is a bus, just like the PC Express bus, which means that it can add devices to your PC.

    • @florentcastelli
      @florentcastelli Год назад +8

      @@sylviam6535 Having a single button is way more convenient than having to add / remove the "USB condom" (as some call it) each time you want to toggle data on or off. I miss those cables too!

    • @sylviam6535
      @sylviam6535 Год назад +2

      @@florentcastelli - I am not sure that a physical switch would work on USB type C. They would probably need to insert a chip to deal with the additional complexity.

  • @andrewjmarx
    @andrewjmarx Год назад +119

    Another use case where this could be problematic is people getting these cables for their partners/friends/family members as a way to spy on them.
    "Hey honey, have you seen my charging cable?"
    "No. But you can use this extra one I have."

    • @RusticRonnie
      @RusticRonnie Год назад +7

      im gonna use thumbnail to soy on myself. Finally gonna know what the fuck i do all day

    • @Programmdude
      @Programmdude Год назад +21

      Generally if you're going to spy on your loved ones, you'd also have physical access to the devices they use too. Sneaking in a USB device into the back of their desktop or laptop is going to be easier and cheaper than ensuring they use your cable.

    • @TruthDoesNotExist
      @TruthDoesNotExist Год назад +2

      @@Programmdude yes but when it comes down in price it would be less phishy and a cheap way to get into the person phone which these devices target also

    • @greenanubis
      @greenanubis Год назад +1

      People have been hacking each other since people exist. Its even common to treat ideas and thoughts like this usb cable, like a threat. And sometimes they are. This tech is interesting, nonetheless.

    • @RJRC_105
      @RJRC_105 Год назад +5

      Already exists. Use of a hardware keylogger on your partners PC to spy on them for abusive purposes has been a thing for years. Most people won't notice something in the back of their machine that wasn't there before.

  • @IGN_OFFClAL
    @IGN_OFFClAL Год назад +8

    I get that mike is on the up and up... but when they said he made a cable to detect malicious cables... I got some very "we created a disease to sell an antidote," vibes

  • @chalor182
    @chalor182 Год назад +51

    Juice jacking is an absolutely perfect hacking term in the classic style. Reminds me of phone phreaking

  • @The__Mask
    @The__Mask Год назад +24

    The Scary part would be when it gets cheap enough that an Amazon 3rd party starts selling these as regular usb cables.

  • @martyjackson4166
    @martyjackson4166 Год назад +3

    Like, I can appreciate him making it as “showing everybody what’s possible” sort of scenario. But why is he mass-producing it and selling it? That seems like a step too far. Because people besides just those who would need this to research security can get their hands on them

  • @transcendant7000
    @transcendant7000 Год назад +34

    I can't wait to hear about the next LTT hack because someone watched this and thought "what if".

    • @hubertnnn
      @hubertnnn Год назад +1

      If I would live anywhere near I would definitely do this.
      On the other hand I hope dbrand will use one of those to prank Linus with their next "hacked" lineup

  • @Struders
    @Struders Год назад +89

    Wow.. "Best to learn about it now when it is expensive rather than later when it's cheap and too late" is probably the best line from an LTT video.. like ever!

    • @StreetPreacherr
      @StreetPreacherr Год назад +4

      No kidding. Even the ELITE version is ONLY $199.99, that's CHEAP for something with such nearly limitless functionality!

    • @housemouseshorts
      @housemouseshorts Год назад

      It still won't matter

  • @JolanXBL
    @JolanXBL Год назад +2

    11:21 So buying a similar-looking cable from London Drugs, swapping them, then returning for it to be placed back onto the shelf as open product, or dropping the cables off to a thrift store, or even hanging them yourself, are not realistic scenarios today? $119 is a lot, but as with playing the lottery, you only need 1 win to become rich.

  • @210Artemka
    @210Artemka Год назад +17

    0:46
    "All for less than a price of a backpack"
    A 250$ backpack!

    • @REAL-UNKNOWN-SHINOBI
      @REAL-UNKNOWN-SHINOBI Год назад

      A backpack that may or may not still have no warranty.

    • @nsevv
      @nsevv Год назад

      lifetime warranty?

  • @festro1000
    @festro1000 Год назад +29

    Juicejacking makes sense considering the term juice is synonymous with power; leaving a "charger cable" at a diner would be a really effective means of attack especially if the victim believes that cable is the only means of keeping their device charged. Take a McDonalds near our location for example, they have only one seat adjacent to an outlet, if an inconspicuous cable is just sitting there and their phone is about to die chances are they aren't going to spend the time to dig around for their own cable (if they have one).

  • @Jessie3985_
    @Jessie3985_ Год назад +8

    I love that the creator had to make a malicious cable detector lol

  • @jessebraughler8594
    @jessebraughler8594 Год назад +37

    Always cool to see LTT do a more simplified overview of HAK5 tools. Might be cool to see a cybersec spinoff channel so a bigger channel like yours can help spread awareness.

  • @alejandroreyes9574
    @alejandroreyes9574 Год назад +10

    I feel the argument that it is a warning is pretty weak when it's being sold...

  • @rchaven-whooptang5211
    @rchaven-whooptang5211 Год назад +2

    Hehe, 9:52, the wife-factor 🤣

  • @vagner995
    @vagner995 Год назад +62

    This is just plain dangerous. Thanks techies for making my day less anxious and safer.

    • @oldtools6089
      @oldtools6089 Год назад +1

      You're welcome. As consolation, you don't need to be afraid of hackers trying to compromise your systems until you have data worth stealing. Are your memories safe? I sell zero-day exploits on bug-bounty forums. Secure your bad ideas and protect the future of disinformation.

    • @FilmFlam-8008
      @FilmFlam-8008 Год назад +3

      @@oldtools6089 assuming you don’t have information worth stealing is this first mistake.
      Do you have a social security number? Then you have information worth stealing. That number is worth a lot of money.

    • @chiranjeevsahoo4960
      @chiranjeevsahoo4960 Год назад

      ​@@FilmFlam-8008there's also a factor of "have you made any severe enemies to go to these lengths".

    • @FilmFlam-8008
      @FilmFlam-8008 Год назад

      @@chiranjeevsahoo4960 no.
      I know people that have had their SS number or cards stolen with no enemies.
      Those are worth thousands.

    • @alexturnbackthearmy1907
      @alexturnbackthearmy1907 Год назад

      @@FilmFlam-8008 And are profitable even at this cost

  • @nysiy5360
    @nysiy5360 Год назад +38

    Love the recent security focused videos. Please keep them coming.

  • @bipolarminddroppings
    @bipolarminddroppings Год назад +2

    The only cables or usb devices that ever get plugged into my machines are ones I have bought by going to a physical shop and grabbing one off the rack.
    So, unless I get super unlucky or someone reeeeeaaaaaalllllyyyy wants to steal the £3.50 in my bank account and goes to some extreme lengths, I think I'm safe from these badboys.

  • @Zeruyu
    @Zeruyu Год назад +20

    Is the cable also available with RGB? It would raise suspicion if I hand over a cable without RGB.

  • @asdanjer
    @asdanjer Год назад +286

    I would totally use this on my worst enemy.

  • @CarsSimplified
    @CarsSimplified Год назад +1

    Does that data blocker only block data on the side it plugs into? Seems like the phone plugged into the other side would need a data blocker of it's own.

  • @xavy_
    @xavy_ Год назад +59

    the worst thing about this seems to be the fact that these cables are unmarked. amazon sellers could easily have some of these mixed in with a generic product

    • @reahreic7698
      @reahreic7698 Год назад +15

      Ding, Ding, Ding. Shared product bins is already an issue beset with with counterfeit knockoffs. The fact this exists at all should be a crime, and if not the engineers responsible should be mandated to carry liability insurance to cover any damages resulting from their product being used by anyone that's not a white hat.

    • @malborboss
      @malborboss Год назад +12

      Or someone could buy legit cable, replace it with one of those, and return it. Scarry but possible...

    • @altokers
      @altokers Год назад +11

      ​@@reahreic7698 i feel like you're reaching a bit. This thing is only effective if the person who wants to use it is able to get close to the person. So what are they going to mix it in with legit cables and pray they get it sent to the person they want to attack?

    • @Henrik_Holst
      @Henrik_Holst Год назад +5

      @@altokers that and the cost would be astronomical

    • @zack9912000
      @zack9912000 Год назад

      Dont buy stuff from amazon

  • @RVZORBVCK
    @RVZORBVCK Год назад +53

    I've said it before, I absolutely love the security videos.. please continue to make them.

    • @evolicious
      @evolicious Год назад +1

      They are more or less fearmongering misinformation. These tools are useless in real life and pose zero threat. They have been around for years for $1, and there have never been any recorded accounts of these attacks being used on anyone.

  • @Cart1416
    @Cart1416 Год назад +2

    Apple should add a thing where if you already have a keyboard or mouse and you plug in a new device then it will ask you if you want to trust it

  • @TylerMcVeigh1
    @TylerMcVeigh1 Год назад +167

    I feel like the quote, "Your scientists were so preoccupied with whether or not they could, they didn't stop to think if they should." best applies to this cable.

    • @joshbittner
      @joshbittner Год назад +33

      This cable should be a crime

    • @ForeverHobbit
      @ForeverHobbit Год назад +12

      @@joshbittner ethen hackers that need one will just make their own, You ren't solving the problem

    • @PartikleVT
      @PartikleVT Год назад +29

      The problem with that saying is (skipping the whole scientists vs engineers, the tech isnt new the application is) not that this is a unique tool developed by some masterminds. It's common tech thats been packaged and branded for the consumers. CIA had this tech 10 years ago and so did probably other state funded organizations as well. It's only a matter of time before you can buy it from aliexpress for a dollar. Creating this product and bringing this design flaw in USB to the light of mass audiences does more good than harm to the world collectively.

    • @SivaKanthSharma
      @SivaKanthSharma Год назад +18

      No, what applies better is “security through obscurity is no security at all”. OMG didn’t create this attack vector, he made it accessible to everyone and raised awareness that this exists. Now more people will be on guard, look at this and work on mitigating this.

    • @fishontheinternetz3641
      @fishontheinternetz3641 Год назад +15

      @@ForeverHobbit "not solving the problem" is not an invitation to make that problem even worse.

  • @paulpardee
    @paulpardee Год назад +108

    The way I see it, this was always a viable attack vector. If Mike didn't make his publicly available, someone else would be doing it in secret (and likely already has). If you don't know a threat is out there, you can't defend against it.

    • @gludlok747
      @gludlok747 Год назад +16

      Except that he clearly doesn't care about the security aspect and he is creating THE NEED. He rationalizes heavily and his body language is visibly giddy about the potential chaos that he can sow by having a tool - that would normally cost substantially more and for good reason - much more accessible to the average populace who are willing to sacrifice their kidney for a goddamn $2000 GPU. For LTT to brush that aside while using it as an example was an "O_O are you serious?" moment.
      The irony of this is that he is apparently lackadaisical about it at home and was forced to create a counter-measure because his wife was getting tired of his bullshit. (Frankly, i'd just divorce the asshole.)

    • @RoshiGaming
      @RoshiGaming Год назад +26

      @@gludlok747 who pissed in your cheerios?

    • @gludlok747
      @gludlok747 Год назад +6

      @@RoshiGaming No one. Well.. not that i've noticed anyway. I just know bad news when I see it and I haven't felt this uncomfortable watching an LTT video ..ever. So I responded to a comment that helped formulate what I was thinking.

    • @LxciferXIII
      @LxciferXIII Год назад

      @@gludlok747 you’re actually dumb. Nearly everyone who works in offensive security from pentesting to red teaming gets excited and giddy about new hacks and toys. Anyone else who is able to invent anything similar to that from Proxmark to the bash bunny has every right to be excited about what they achieved and it’s dumb to think that means anything about their attitude to security.

    • @housemouseshorts
      @housemouseshorts Год назад +1

      @@gludlok747 the counter messure may actualy be just as bad as the creation. hes just not going to tell you. and make you think you are safe. thats the level we are at here.

  • @little-wytch
    @little-wytch Год назад +5

    I've known about Hak.5 for longer than I've known about LTT lol. I love their stuff and those they associate with like omg and rf1. But there is one thing I didn't consider until watching this video... the Linux-based OS called Qubes OS (you should do a video on that btw if you haven't already lol) can be set up to have all USB devices connected to a dedicated, untrusted Qube, and if you want to use something like an external keyboard/mouse, you need to first pass the USB device thru from the USB Qube to the target Qube. I wonder if that would be enough to catch a bad device like a rubber ducky or omg cable before you can pass it thru to another Qube. Might be worth a video to test all these things on Qubes lol.

    • @Ck87JF
      @Ck87JF Год назад

      Curious, if all USB devices have to be configured, how do you even begin with your real keyboard & mouse if they don't work at the start?

    • @little-wytch
      @little-wytch Год назад

      ​@@Ck87JF that... is a really good question lol. I honestly don't know. I've only ever used it on a laptop, and I think that's what it's mainly used for. My guess would be if you use it on a desktop, you'd have at least a generic USB to PS/2 adapter.

    • @Ck87JF
      @Ck87JF Год назад

      @@little-wytch Even with a laptop, I'm pretty sure the built-in keyboard & touchpad are seen as USB devices, so maybe there's some kind of thing that says "this specific device with this identifier was here at install time, so we trust it" while any additional HIDs have to be configured. Which if your internal device breaks ... :P

  • @awesome9650
    @awesome9650 Год назад +72

    As Mike said, the average person and probably does not have to worry about an attack like this right now because it's too powerful.
    "You don't aim a cannon to kill a fly"

    • @foldionepapyrus3441
      @foldionepapyrus3441 Год назад +30

      But when you are mass producing the cannon ball anyway, you may as well have a go...

    • @mola1.980
      @mola1.980 Год назад +5

      These are not powerful. You can't do much with them. They are only useful if you know a lot about your target and want to get data on their computer

    • @danielfranz6560
      @danielfranz6560 Год назад +8

      I dunno, I mean I think a fly is kind of a bad example though. You've heard the lengths people will go to kill a spider right?

    • @DialecticRed
      @DialecticRed Год назад +2

      @@MK73DS Yeah I've noticed that too, they really do charge slowly. Unfortunately for me, I've had a lot of accounts hacked because I've had most of them since I was a kid and didn't take any cyber security stuff seriously. My twitter account was taken over and now advertises knock off facebook glasses. I actually got the real ones as a gift once because my parents just thought I really, really wanted them because the account was constantly DMing all of my relatives and everything and was posting about it constantly. In reality, I find them creepy AF, so I've never used them.

    • @olanmills64
      @olanmills64 Год назад +4

      This is such a weak argument. It would make sense if the device was $10k or needed a team of elite experts to operate. That's not the case though. Instead, this argument sounds like, "Why do I need to use passwords? I'm not valuable enough to be attacked"
      When attacking is relatively cheap, then it doesn't matter

  • @icy_liquidd1935
    @icy_liquidd1935 Год назад +16

    Although I find this technology somewhat frightening. I am much more concerned with the fact that I never knew it existed to this point. The best way to protect yourself is to become educated on the topic. That is why I hope LTT continues to come out with great videos teaching us about nefarious methods an individual might use in the tech sector.

    • @flameshana9
      @flameshana9 Год назад

      If education actually solved problems we wouldn't have them. The internet's been around for almost 3 decades but humanity is less educated than ever. They fall for the most obvious scams. Do you know how many times I have to tell my family not to do certain things on a computer/phone? They still don't understand not to immediately trust what they see.
      Pessimism is a better protection than trying to learn about all the different ways life can screw you over. Case in point, the guy who made this said there's many easier ways that are constantly being used. These methods are rare.

    • @housemouseshorts
      @housemouseshorts Год назад

      you can't protect yourself. its out there

    • @caddyguy5369
      @caddyguy5369 Год назад

      @@housemouseshorts Living the rest of my days out in the woods becomes a more enticing option with every passing day.

  • @zigzatuzoo
    @zigzatuzoo Год назад +6

    I'm glad your covering this. I saw these and picked one up at DefCon last year and have been messing around with it, it's a GREAT Red Teaming tool, especially if it's more than just a single day op. You can either connect it yourself or leave/swap it on a desk when your doing a "scheduled unscheduled audit" or something similar. (I'm a professional pentester not just breaking into tech companies without permission)

  • @David_Quinn_Photography
    @David_Quinn_Photography Год назад +14

    Fun now I cant trust a random USB cable either, thank you for sharing now time to retrain the family to not to plug in any random device to their phone or PC.

    • @MR3
      @MR3 Год назад

      its not actually a thread today

    • @wnsjimbo2863
      @wnsjimbo2863 Год назад

      Dude your family is no-one
      Cybercryminals wont try this to your family

    • @Ichbaar
      @Ichbaar Год назад

      @@MR3 The fuck does that even mean?

    • @SyntheticSpy
      @SyntheticSpy Год назад +1

      @@wnsjimbo2863 cyber criminals target anyone cause you never know who has something of value. It may not be likely now, but I can totally see people selling cheaper versions of these online at some point in the future with malicious intents

    • @flameshana9
      @flameshana9 Год назад

      @@SyntheticSpy This. Once scammers buy them by the millions they'll be in thousands of homes and have control over their computer, just sitting there waiting for someone to knock on their virtual door and it'll let them in.

  • @heyspookyboogie644
    @heyspookyboogie644 Год назад +17

    I’d be more interested in knowing how to take control of one of these sorts of cables should you find one. Would be fun to just get one for free and spoil an attack.

    • @O.MG-MG
      @O.MG-MG Год назад +8

      One of the OMG Programmers will let you completely reload the firmware and use it as your own. Also, the programmer can be used for doing full forensic dumps on OMG Cables, we actually have a forensic capture tool built into our python flasher.

    • @alexoja2918
      @alexoja2918 Год назад

      Please add a digital output pin, a tiny compartment for my own stuff and a small ultra capacitor to the cable. Nothing like a good fire to destroy evidence. Metaphorically speaking.

  • @seankkg
    @seankkg Год назад +41

    Use this USB malicious cable detector that definitely isn't compromised we promise.

    • @O.MG-MG
      @O.MG-MG Год назад

      It would be product suicide to put backdoors into something sold to the infosec community. They would find it pretty fast. Detector has been out for a couple years now.

    • @carl7534
      @carl7534 Год назад +1

      i mean, why would it? he is not selling malware, he is selling tools.

    • @flameshana9
      @flameshana9 Год назад +2

      @@carl7534 I mean, why would Microsoft put spyware in Windows? You paid lots of money for it. Shouldn't they be happy with the money they got?
      Same with every phone company. And every piece of "smart" tech.

    • @housemouseshorts
      @housemouseshorts Год назад

      THANK YOU someone else who is saying this. I;ve been replying to comments praiseing the dectoror for the last hour. Trying to drill it into peoples minds. Why would you trust this guy? He created this evil thing. Why do you people think the solution he sold is going to be a solotion? Think about it people. Now he has all your data access to your computer your network AND you have given him MORE money to "be safe" What if the detector itself is even WORSE?

    • @housemouseshorts
      @housemouseshorts Год назад

      @@carl7534 Why would he not? Now you have given him your money TWICE. and he has acsess to your data

  • @Teddybaer06
    @Teddybaer06 Год назад +14

    But could I use this cable as a portable router ...🤔

    • @mola1.980
      @mola1.980 Год назад

      Yes, if you modify it's firmware or constantly run code on your phone which acts as a vpn and reroutes data to the cable, but then you would have very shity bandwidth because this thing doesn't have any processing power.
      You could instead just turn on hot spot. Your smartphone is a portable router

    • @Teddybaer06
      @Teddybaer06 Год назад

      @@mola1.980 might as well just use a hotspot then, but if you could add some processing power to it, free internet. In theory

    • @mola1.980
      @mola1.980 Год назад

      @@Teddybaer06 yes? That was what I wrote?
      "You could instead just turn on hot spot. Your smartphone is a portable router "

    • @Teddybaer06
      @Teddybaer06 Год назад

      @@mola1.980 yeah I know lol

    • @mola1.980
      @mola1.980 Год назад

      @@Teddybaer06 Sorry i misunderstood your comment

  • @eeetube1234
    @eeetube1234 Год назад +3

    Additionally, you should always close windows, because USB stick theoretically can be inserted by drone.

  • @esbjornmonteliusrisberg6834
    @esbjornmonteliusrisberg6834 Год назад +7

    8:50 " sif someone can walk in and take something, they can walk in and plant something" LTT's security are clear at risk seeing how much get taken from the office😂

  • @manicmods
    @manicmods Год назад +2

    The Malicious Cable Detector should have a "Destroyer" companion. I wonder how that cable would handle 30V 🤔

  • @watercannonscollaboration2281
    @watercannonscollaboration2281 Год назад +6

    Given how little people seems to be security aware (for example i dumpster dive and I’ve seen a lot of people not even encrypting/wiping a drive), this might already be overkill enough

  • @SwefoZ
    @SwefoZ Год назад +6

    I assume there is a new focus on cybersecurity over at LTT after the recent hack... good to see more content making that world more accessible in a responsible way. I studied academic Philosophy and the depth of the conversations around the cybersecurity world about code, ethics, and best practices is in the company of the deepest conversations I've ever ran across. Maybe LTT should talk to Steve Gibson over at the Security Now podcast.

  • @tranceonline
    @tranceonline Год назад +16

    To be safe on public charging-stations, you could also just use power-only cables. Those don't have any Data-lines.

    • @LieseFury
      @LieseFury Год назад +2

      USB-C cables all have data lines, they're what allow rapid charging.

  • @loghut
    @loghut Год назад +27

    2:43 love how you used the payload skins from Team Fortress 2 to illustrate payloads :) if I'm correct about the origin of those carts, of course
    Edit: I would also recommend everyone to carry an extra USB cable that doesn't support data transfer in case of having to use a publicly accessible charging USB port. Might be a redundance but an extra USB cable doesn't weigh much and brings some extra safety when using public chargers

    • @bobthebuilder7059
      @bobthebuilder7059 Год назад

      Yup those are the TF2 payloads used in game.

    • @fairyball3929
      @fairyball3929 Год назад +1

      No data transfer might mean less support for fast charging protocols, but... I guess that's a small price to pay for added safety from attackers.

    • @Xachremos
      @Xachremos Год назад +1

      @@fairyball3929 Most public charger i've used havent had fast charging anyways. You aren't losing out on much

    • @fairyball3929
      @fairyball3929 Год назад

      @@Xachremos Oh yeah, I forgo that lots of public usb chargers built into outlet plates max out the voltage a 5V and current at 3-4 A.

  • @spencer5051
    @spencer5051 Год назад +85

    Hak5 always comes out with some wild stuff.

    • @danyal_assi
      @danyal_assi Год назад +3

      Toilet

    • @joshbittner
      @joshbittner Год назад +3

      Criminal activity

    • @spencer5051
      @spencer5051 Год назад +4

      @@joshbittner it’s a tool just like a car, hammer, gun, etc.

    • @cameron7374
      @cameron7374 Год назад +3

      @@spencer5051 I wouldn't exactly call a gun a tool.

    • @d3fault1420
      @d3fault1420 Год назад +1

      @@cameron7374 its a self defense tool in some cases

  • @BruceKarrde
    @BruceKarrde Год назад +2

    Here's an example I had during my trainings. I proposed the students to only share files and documents with approved or known team members of a contractor. If they didn't trust it, they should get in contact with the contractor using a phone number known by our company. I got laughed at and they didn't think it was serious. Next, another speaker shared a security awareness of not clicking links in an email. People were like "yeah, that makes sense". I'm like, why don't you take my warning serious, but this one you do?

  • @Addeatt
    @Addeatt Год назад +7

    As much as I hate hearing what people are creating for less than honorable purposes, I do appreciate video's like this to inform the general public.

    • @dorasuncle2717
      @dorasuncle2717 Год назад

      I really wonder why someone would create something like this

  • @mcmillanator
    @mcmillanator Год назад +5

    I've been wanting one of these since they first hit the market. Same goes for the USB rubber ducky and the WiFi pineapple. I'm too afraid of getting myself into major trouble with it though. lol Besides I wouldn't want to cause real problems for anyone.

  • @PorthoGamesBR
    @PorthoGamesBR Год назад +2

    "It works in Windows, Linux and Mac"
    Me using TempleOs

  • @kitslayer8509
    @kitslayer8509 Год назад +18

    I need this cord for educational purposes

  • @3isr3g3n
    @3isr3g3n Год назад +5

    Yeah when we visited a cybersec company they handed us charging only cables, for free. We had a practical demo on the how and why, this video reminds me of that day.

    • @derhintze
      @derhintze Год назад +1

      Why? Because you got that omg cable for free - and didn't even notice?

  • @roshtar2k8
    @roshtar2k8 Год назад +3

    Man, I think this could be a real threat on university campuses. Drop one of these in the library or computer lab. Heck, just plug it in to a computer and leave it. You'll have hundreds of passwords and log in info by the end of the week. Put one of the go betweens on a uni keyboard and people could do all kinds of damage.

  • @danwhite3224
    @danwhite3224 Год назад +22

    Things like the Flipper Zero, and Rubber Ducky to an extent, are great tools that can be used for a bunch of legitimate purposes (or at least, depending on the stuff that's loaded on it, stuff that doesn't cause permanent damage), however stuff like this and "USB killers" have no reason to exist other than as purely malicious tools. I certainly wouldn't plug in some random flash drive or cable that I'd find on the street, but who's to say some kid won't innocently plug one in and do untold damage to their own, their parents' or their school's PCs? They don't know any better.

    • @karelchrastina5655
      @karelchrastina5655 Год назад +1

      What I find interesting is the argument - it's too expensive for a general person to meet it. Is he like never met a bored rich kid? The only question is if they have the skills to do some actual damage. And since it can be used as an overpriced keylogger... dunno, may be enough to log into a teacher's account or something. I like this as a teaching tool, but saying the price is deterrent is weird.

    • @SanderEvers
      @SanderEvers Год назад +1

      These OMG cables aren't unique. The point they make is, this way you can legally see how these work and how to protect against them. Also this will force companies to improve protection of their devices.

    • @flameshana9
      @flameshana9 Год назад

      @@SanderEvers Proactive is not a word you often use for humanity. More like "Wait until it happens to millions of people, then make news and clickbait videos about it, then nag the government, then wait a year until they do something."

    • @Shadow66090
      @Shadow66090 Год назад

      ​@@SanderEvers What I am afraid of is one thing - once these become widespread, the companies will instead all branch out into their own proprietary standards in a panicked attempt to fix the issue. And instead of one universal standard for plugging in peripherals, we will have a dozen.

    • @marcellkovacs5452
      @marcellkovacs5452 Год назад

      If the Flipper Zero or the Rubber Ducky can be used for legitimate purposes (and they can), then so can be the OM.G Cable.

  • @wumwum42
    @wumwum42 Год назад +4

    I don't get why there isn't an option to enable a "Activating keyboard/mouse in 5 seconds" popup so if you clearly aren't plugging in a keyboard or mouse in your pc, you can remove it. Thogh it should only be on the os-level (Obviously it should always be enabled pre-boot for changing bios settings etc)

    • @me2olive
      @me2olive Год назад +3

      That would seem like an incredibly easy fix, wouldn't it! Just pop up a warning whenever someone plugs in a new HID device of any kind. I'm surprised it's not already standard, this has been a known attack vector for years now.

    • @marcellkovacs5452
      @marcellkovacs5452 Год назад

      This is only works if your user is actively looking out for this kind of attack. Otherwise they will be confused and simply ignore the prompt.

    • @wumwum42
      @wumwum42 Год назад

      @@marcellkovacs5452 I think telling people "If this prompt shows up when plugging in a USB stick, remove the stick immediately" is doable

  • @TheWindMage
    @TheWindMage Год назад +2

    >less than the price of a backpack
    >$250
    Seems you don't understand that $250 is a lot of money for most people.

  • @GalaxyStation
    @GalaxyStation Год назад +5

    While every other big RUclipsrs are going to give its viewers same content at the same time, Linus always make a way for him by differentiating his content from others. Love you man!

  • @aaronlandry3947
    @aaronlandry3947 Год назад +18

    A couple of things that you could have brought up to help protect you against these is to not use computer profiles that have administrator access as you are default account. Yes it's more annoying to have to type in a username and password every time you want to change a particular setting or install a program but it's one more layer of security that malicious actors have to navigate past when the default user logged in is not an administrator.

    • @sbmotoracer
      @sbmotoracer Год назад +8

      Expect they showed in the video that's a (somewhat) trival thing to bypass esp with keylogger capabilities.

  • @snakewithapen5489
    @snakewithapen5489 Год назад +2

    Is there any possible use for this kind of device for a normal person? it seems very strange to me that something that looks like it might be exclusively used for malware and hacking could be sold and advertised so publically! Is there some other 'purpose' that the average man or a tech business could use something like this technology for?

  • @QualityDoggo
    @QualityDoggo Год назад +34

    Great stuff! This type of attack has been possible for a while but to make it easier and streamlined hopefully will expedite countermeasures both in IT and personal awareness.

    • @danyal_assi
      @danyal_assi Год назад

      Toilet

    • @mobiusflammel9372
      @mobiusflammel9372 Год назад +4

      It seems to me the proliferation of devices like this is going to, at some point, spur a harsher (possibly) international regulatory response.

  • @desaanab2279
    @desaanab2279 Год назад +6

    Create a hacking cable to scare companies, then create a device to block it. Stonks 📈😂

  • @__8120
    @__8120 Год назад +1

    As an excellent comic pointed out, the real way bad actors get your passwords isn't hacking the mainframe and breaking the 2048-bit encryption blah blah blah, it's more like they phone you and say "hey this is Bob the password inspector" and bada-bing bada-boom

  • @oscarcacnio8418
    @oscarcacnio8418 Год назад +6

    One of the few times that I am aware of a new product months before Linus publicly covers it. Was able to even hold one in my hands at my local Cybersecurity club.

  • @CorsairTrumpet
    @CorsairTrumpet Год назад +6

    Love network security content definitely want more of this kind of content!!