A USB-C cable can hide a lot of malicious hardware, CT scan shows

nanoguy

Posts: 1,361   +27
Staff member
Why it matters: A simple search on Amazon or any other online retailer will show that consumers have a wide selection of USB-C cables, with options ranging from just a few dollars to over $100. The price primarily depends on things like length, quality of construction, compliance with various parts of the USB-C spec, and branding.

While USB-C may be the most flexible connection for digital devices, it's also confusing to the point where it pays off to learn about the intricacies of this ever-evolving standard. Its primary goal is to simplify things so consumers can use a single cable for data, audio, video, and power delivery.

However, a cable's specs are not always the same, and packing is often vague regarding the cable's capabilities. There is also the potential for USB-C cables to hide malicious circuitry that compromises the security of your device.

At first glance, USB-C cables look mostly the same. However, some feature active circuitry inside. Thanks to equipment like Lumafield's Neptune Industrial X-Ray CT Scanner, we can see the internal design of something like Apple's $129 Thunderbolt 4 USB-C cable is much more complex than a $11.69 Amazon Basics cable, which doesn't even use all the pins on the USB-C connector (below).

More recently, Lumafield investigated an O.MG USB-C cable. It is another example of the sophisticated electronics you can hide inside a normal-looking USB-C connector. However, the O.MG cable is a niche product created by Mike Grover and designed for security research and to increase awareness about potentially malicious hardware users could find in the wild.

John Bruner of Lumafield says that many people who saw the previous scans were understandably worried that what looks like an ordinary USB connector could easily contain hardware that can inject malicious code, log keystrokes, and extract personal data.

Notably, the O.MG cable features a clever design that could make it easy to overlook such circuitry when using standard inspection methods. While an ordinary 2D X-ray scan would quickly reveal the antenna and microcontroller, it took a 3D scan and fiddling with visualization parameters to spot a second set of wires going to a second die stacked on top of the microcontroller (below).

Bruner believes CT scanning is quickly becoming an important security tool for verifying the integrity of hardware during manufacturing before it has a chance of causing harm to individuals, companies, and critical infrastructure. An undetected supply chain attack can lead to serious consequences, as shown by the recent example of exploding pagers used in Lebanon to target Hezbollah leaders.

Fortunately, the average consumer doesn't need to worry about explosives inside their cables, and products like the O.MG cable are usually too expensive for the general public, with these specialty devices going for up to $200. Even the EvilCrow Wind cable, a more affordable alternative that hides a powerful ESP32-S3 SoC with Wi-Fi and Bluetooth connectivity, still costs over $60.

Still, Bruner recommends using certified USB-C cables and avoiding public USB charging ports when possible.

Permalink to story:

 
If you look closely at the CT images of the 4 cables, they are all the same cable, the complex additional hardware is to format the electricity so certain devices which normally wouldn't be able to handle the power over the cable can handle it. It's all basically the same cable with additional formatting technology on the front which makes a difference when using specialized devices like apple devices. If the Apple device expects the power formatted in a particular way like their cables would do, it can use the power over the line much more effectively: faster charging, distribution, segments of power and data etc.
 
If you look closely at the CT images of the 4 cables, they are all the same cable, the complex additional hardware is to format the electricity so certain devices which normally wouldn't be able to handle the power over the cable can handle it. It's all basically the same cable with additional formatting technology on the front which makes a difference when using specialized devices like apple devices. If the Apple device expects the power formatted in a particular way like their cables would do, it can use the power over the line much more effectively: faster charging, distribution, segments of power and data etc.

No, USB-C cables uses a SIGNAL. The more bandwidth and connections you have the moAr signaling you can do. (hence the more bandwidth)

There are some things known as "cheap cables". Should always stick to a known name-brand when buying them, bcz it's not an everyday purchase and will be used every day. Simply no need to skimp on known quality and security of a name brand Cable on your systems.
 
.... this looked familiar .. oh wait this was reported back in 2023 originally ... even the ct layout is similar.

zmescience.XXX/science/news-science/x-rays-usb-c-cables/

comon, yes this is a ''security article'' but we have known about hostile cables since the EQUATION GROUP dumps from ... how long ago? oh yeah, SNOWDEN DAYS and the original classification of ''BAD USB'' as an attack vector.

this is not new, this is not news.
 
Back