#BeAware: Nothing is impossible

18. September 2019

It is widely known that attackers can manipulate USB memory sticks, computer mice or presenter sticks in order to compromise computers or entire systems.

Not many people are aware, however, that this also works with charging cables. From the outside they look normal, but have been manipulated so that a computer will recognize them as an input device instead of a charging cable.

When using such a cable to connect your smartphone with a computer, a tiny circuit board that was built into the plug can send keystrokes to the computer. By doing that an attacker can open malicious websites or obtain access to a specific network.

What are the consequences for users? First of all: Hands off anything that wasn’t issued by your internal IT department or bought from a reputable supplier. Please be careful with freebies and giveaways or better, don’t accept anything at all. Attackers have no inhibitions to exploit such situations: In the past, listening devices have been found in pens or business card holders, for example.


About #BeAware:
We all know them from our daily work: security tips, the latest virus reports, horror stories from the world of cyber security. With #BeAware, usd security awareness experts would like to help you understand these messages. The articles highlight relevant IT security issues and the most common methods used by hackers and criminals, and give tips on what anyone can do to protect themselves and their company. For more security.

Also interesting:

DORA Deep Dive: Threat-Led Penetration Testing (TLPT)

DORA Deep Dive: Threat-Led Penetration Testing (TLPT)

Since the publication of the original blog post in May 2024, the final version of the RTS for TLPT has been released. The blog post has been updated accordingly and now covers the current requirements. The Digital Operational Resilience Act (DORA) came into force on...

Red Teaming: 5 Questions Every IT Leader Wants Answered

Red Teaming: 5 Questions Every IT Leader Wants Answered

Many companies invest in firewalls, endpoint protection, and awareness training, assuming that this puts them in a strong position. But the reality is different: attackers do not think in terms of tools, but in terms of targets. They combine technical vulnerabilities...

Categories

Categories