A renowned security expert warns about the dangers of keylogging and how USB-C cables are becoming the new favorite tool of hackers.
The dangers and risks in cyber security that put mobile phone users at risk np they don’t stop. If WiFi or Bluetooth weren’t enough, now it’s the turn of USB-C cables that could be used by hackers to carry out keylogging attacks and steal personal information from devices.
Although many believe that mobile vulnerabilities come from WiFi networks or Bluetooth, USB-C cables have proven to be a weak point that could jeopardize the security of our data.
These cables have become an everyday tool, especially after becoming the universal charging standard in Europe, even affecting Apple, which was previously reluctant to abandon its Lightning system.
However, a recent report has uncovered a vulnerability in the cables that allows hackers to infiltrate devices. In addition, Thomas Roth, a cybersecurity expert, detected a vulnerability in the USB-C controller of the iPhone 15.
It seems that cables containing microcontrollers or hidden antennas could be used to inject malware and steal sensitive data.
How to protect your mobile phone from cyberattacks via USB-C cables and prevent keylogging
During the Chaos Communication Congress in Hamburg, Roth gave a demonstration of how modified USB-C cables could execute malicious code once connected to the phone.
This means that a hacker could introduce malicious software into a device without the user realizing it, opening a gateway for other types of attacks, such as keylogging, which is a technique used by hackers to record keystrokes on a device.
This attack can be especially dangerous, as it allows sensitive information such as passwords, bank details or any other information that the user enters on their phone to be captured. Although, for now, this threat requires advanced technical skills to carry out, it is feared that in the future attackers will be able to carry out these attacks with relative ease.
Apple has responded to this vulnerability by assuring that, although the risk is real, the chances of a hacker being able to exploit this vulnerability in devices such as the iPhone 15 are minimal for the moment.
Technology at the click of a button
Even so, the company has implemented some security measures, such as the function to restrict data transfer via USB-C when the device is locked, starting with the iOS 18 update.
However, security experts point out that what today seems like a complex attack could become a much more accessible threat in the future, as the tools to carry it out become more affordable.
To prevent attacks of this type, they recommend that users only use original USB-C cables or those from trusted brands, avoiding connecting their devices to unknown or public USB ports. In addition, keeping operating systems up to date with the latest security patches is an essential measure to protect against any type of vulnerability.
This discovery highlights the importance of security on mobile devices and shows that, although traditional threats such as malware via WiFi or Bluetooth are still relevant, USB-C cables could become the next target for hackers.