Sunday, September 5, 2021

Beware of Hack SPYING! USB-C Cell Phone Cables Key Logging You!

 Key Logging - Privacy Invasion from Cell Phone Cables

"Hand Using Mouse at Desk with Keyboard and Cup" by Image Catalog is marked with CC0 1.0

What is Key Stroke also called Key logging?

Keystroke often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program in which you can be monitored on your computer activity and phone activity. 

Learn more about 👉Keystroke Logging

Did you get a new USB cable for your Birthday, or a Spouse or somebody who wants to spy on you? A security researcher that goes by the name MG (mg.lol/blog/) made the worlds most dangerous USB Cable and it just got better! MG showed motherboard prior in 2019 at a DEF CON hacking conference and now here is the current end product now being sold. MG focus on Apple Lightning USB cable but said the ability to do the same on other cables is possible.

MG tweeted:  OMG Cable - "The New Batch Now in USB C, the implant is much smaller, but it’s even more powerful than before. Smartphone/tablet attacks, extreme long range triggers, geofencing, etc."

As shown on a video testing the product from 300 feet away. Video & Music @KANGAkult logo & art contributions @dustrial


Vice.com Reporter Motherboard Joseph Cox spoke with MG:

  • "There were people who said that Type C cables were safe from this type of implant because there isn't enough space. So, clearly, I had to prove that wrong. :)," MG told Motherboard in an online chat.
  • MG said that the new cables now have geofencing features, where a user can trigger or block the device's payloads based on the physical location of the cable.
  • "We tested this out in downtown Oakland and were able to trigger payloads at over 1 mile," he added.

What is Geofencing? Geofencing is a location-based service in which a creator of an app or other platform/software uses GPS, RFID, Wi-Fi or cellular data to send/trigger messages like SMS, Email or In-App/App-based notifications (pre-programmed action) when mobile devices that enter, exit, or remain parked in the geographical location. For more information visit webengage.com

Motherboard only tested the cables in relatively close proximity, but MG said they've improved the range of the cables.


As Shown on Motherboard YouTube - OMG Interface

You can visit the following website to get more info Vice.com & Motherboard YT

My personal opinion: why in the heck would anyone want to cause such damage and harm on another human being? What if some creeper wanted to Key Log your Teenage daughter or Teenage son. Me personally I have been a victim of someone who targeted me, this type of activity can lead to great harm. I can only tell you beware of who gives you anything that pertains to Cell Phones, Cables and a Computer.  As you can see by the following picture, I purchased a new cable from a legit well known store that carries major brands and when I plug my cell phone my USB-C for a ZTE and the Phone Purchased at MetroPCS, my third party cable, I get a popup screen: 

  • Your device is charging slowly: 
  • Use original charger and cable that came with your device. 
  • Inspect and remove any visible foreign material from cable connection


I did a search and I couldn't find anything on why when I use my cable for my cell I get  popup window.  Am I hacked and tracked? Leave a comment, What do you believe this is showing and why on my cell phone ZTE.

What to do if you have been key logged and it's not detected. Me personally I would not use the Computer or Cell phone any longer and I would want to purchase everything new, it's like when you get a brand new car and someone hits it, it just isn't the same. At what cost do you want to be spied on by someone who has it out for you and then later maybe use it against you just to be evil, evil intentions! 

Here is additional information to read about Key logging on your PC and what you need to know. Please visit usa.kaspersky.com/resource-center/definitions/keylogger




Read Breached, You are listed on 80 Billion records!
👇




Now you know!
Dare - Challenge - Learn! 
Be not afraid of life. Believe that life is worth living, and your belief will help create the fact. William James - American philosopher. 



Avid Hemp CBD
Please check out our Affiliate Avid Hemp - Great Deals!
Visit our Affiliate for some Great Deal - Avid Hemp

No comments:

Post a Comment

CLEVELAND, OH - TENANT CONCERNS OF SAFETY HAZARD - 3 YEARS CALLS GO UNANSWERED FROM STREET LIGHT PROPERTY MANAGEMENT TO FIX THE PROBLEMS

STREET LIGHT RENTALS A family of 5 with 3 small children out of Cleveland Ohio has been dealing with it raining inside a bedroom growing mo...