• decrypting defi
  • blockchain&beyond
  • news
  • 18 Dec 24

Hackers Use Fake Charging Cables to Steal Cryptocurrency — How to Protect Yourself

Cybersecurity expert Ryan M. Montgomery has demonstrated how scammers can steal cryptocurrency and other data by using a fake phone charging cable.

  • 163
  • 0
  • 0
nft.eu
  • rating +15
  • subscribers 60

Cybersecurity expert Ryan M. Montgomery has demonstrated how scammers can steal cryptocurrency and other data by using a fake phone charging cable. At first glance, the cable looks ordinary, but it actually poses a serious threat to device security.

How It Works

In a video, Ryan Montgomery showed how connecting a fake cable to a computer or phone can easily grant unauthorized access. After plugging the cable into a computer, he quickly established a connection and opened a terminal with full system access. According to Montgomery, this cable can not only charge devices but also transfer data and inject malware, making it dangerous.

Montgomery warns that it’s important to be vigilant when using unfamiliar cables, especially in public places or situations where you can’t be sure of the device’s safety. For additional protection, the expert recommends using special USB data blockers to prevent unauthorized data transfer.

Other Malicious Devices

Beyond harmful charging cables, there are other tools hackers use to steal data and funds. A user named @helpfulai compiled a list of the most dangerous gadgets:

  • Wi-Fi Pineapple: A device for analyzing Wi-Fi networks, which can be used to intercept data.
  • USB Rubber Ducky: Looks like a USB flash drive, but acts as a keyboard upon connection, allowing remote commands to be executed on a computer.
  • ScreenCrab: Acts as an intermediary between an HDMI source and a display, secretly capturing the screen.
  • Hacking Watch: A watch designed to scan Wi-Fi networks and conduct attacks on them.
  • Pwnagotchi: A device intended for capturing information that can be used to crack Wi-Fi passwords.

Recommendations for Protecting Against Cyber Threats

Scammers are constantly refining their methods for data and fund theft. To protect yourself, consider the following:

  • Be Cautious When Connecting Devices: Avoid plugging in unknown cables or devices into your gadgets.
  • Regular Software Updates: Keep operating systems and applications updated to protect against known vulnerabilities.
  • Education and Awareness: Stay informed about new scam methods and share this information with others.

Following these recommendations will help minimize risks and protect your digital assets.

Related: NFT Security Checklist for the New Year

This post is for informational purposes only and is not an ad or investment advice. Please do your own research making any decisions.

  • 163
  • 0
  • 0