Get all your news in one place.
100’s of premium titles.
One app.
Start reading
Tom’s Hardware
Tom’s Hardware
Technology
Jowi Morales

USB-C cable CT scan reveals sinister active electronics — O.MG pen testing cable contains a hidden antenna and another die embedded in the microcontroller

O.MG USB-C cable CT scan.

Industrial CT scanner manufacturer Lumafield imaged an O.MG pen testing USB-C cable, revealing sophisticated electronic components secreted within the connector. Lumafield product lead Jon Bruner shared on X (formerly Twitter) a CT scan that revealed the interior of the O.MG cable, showing advanced electronics and an antenna — a much more complicated design versus the Amazon Basic USB-C cable that Lumafield scanned for comparison. Security researcher Mike Grover created this pen testing (penetration testing) cable for fellow security researchers and hobbyists, red teamers, and for awareness training, especially for highly vulnerable or targeted individuals.

Aside from the microcontroller and antenna, Lumafield’s in-depth 3D CT scan revealed a second set of wires connecting a secondary die hidden under the primary microcontroller. This detail is difficult to spot in the scan, requiring some visualization parameter adjustments and a keen eye. When the cable was passed through an ordinary 2D X-ray, this secondary die was practically invisible, allowing it to easily pass cursory inspection. That means devices like this could conceivably pass through standard detection mechanisms. 

The O.MG Elite USB-C cable has several features that could allow anyone controlling it to take over any device plugged into it. Some of its features include keystroke injection, mouse injection, geo-fencing, keylogging, and more.

Lumafield said that it did this scan after it published the internal view of Apple’s Thunderbolt 4 (USB-C) Pro Cable, which revealed a lot of sophisticated electronics inside. Many wondered that if the tech giant could put such a lot of active components inside, maybe someone could put malicious hardware in something as mundane as a USB-C cable. So, Lumafield decided to scan the O.MG cable to see how it hides its active electronics in such a tiny package.

The company's scan shows how a supply chain attack can go undetected. With electronics that look as simple as a charging cable getting more and more complicated every year, anyone, from run-of-the-mill hackers to state-sponsored attackers, could get into the manufacturing process of a device and insert systems that will compromise the final product, or worse.

One glaring example is the recent news of exploding pagers in Lebanon, where someone was able to insert powerful explosives into the devices used by Hezbollah leaders for communication. The pagers changed hands several times — from Taiwan to Hungary — and no one could explain how they were compromised.

The good news is that these cables are expensive, with prices starting at $119.99 for the most basic version. So, you don’t have to be worried about someone spreading this malicious hardware to provide widespread chaos among the public at large. Nevertheless, it’s still better to be safe than sorry, so Bruner recommends that you purchase reputable charging cables sold by trusted stores and avoid public USB ports to charge your devices. If you really need power on-the-go, stick with the best USB-C laptop chargers to avoid getting your devices compromised.

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.