top of page

Let's get to know "Scammer's charging cables!"

O.MG Cable, or as we know it, "data-sucking charging cable," can steal our money if you don't be careful!

Mobile phone charging cable Apart from being utilized for mobile phone charging, utilized for data transport between PCs and mobile devices as well. Additionally, a mobile phone can be connected to a phone charger cord to control external devices like factory control equipment, etc. The charging cable works with a range of connections, as can be seen. Additionally, cell phones are essential gadgets in modern life. They double as wallets and places to store important data. There are many ways to connect the charging cable to a mobile phone. Therefore, we have to get to know the correct and safe use of charging cables.

Connecting with a standard charging cable to charge a mobile phone, the mobile phone actually only needs electricity from the connection. Don't want to connect via data. The user may choose to use the charging cable that is used for charging only. It will not be able to transfer data at all. But if you use a standard charging cable and want to control the use of just charging. For Android devices, you can choose to use it as charging only. Similar to iOS, it will choose not to trust the device while connecting. For those who travel frequently, you may choose to use a USB condom, which is a device that is used to connect the charger cable before connecting to an unknown device to prevent data transfer. Only the electricity sent to the mobile phone remains. This is an option to use to protect data connections.


O.MG Cable

The charging cable, called O.MG Cable, is designed for penetration testing. with a small circuit board embedded That is used to broadcast WiFi Hotspot signals so that fraudsters can connect to the line and be able to capture typing information. Control the machine or can run the program on the machine However, fraudsters must only be within range of O.MG Cable's WiFi Hotspot.

 

Prevention guidelines for the public

  1. If there is no need to use the data transmission. with external connected devices The charging cable should only be used for charging, or when connecting the charging cable, select Charging Only.

  2. Do not use an unreliable person's charging cable or public charging cable.

  3. Trust This Computer should be used on mobile devices. To notify you of connecting a new device for the first time.

  4. While plugging in the charging cable Emerging and suspicious WiFi signals should be noted.

  5. Find a device called a USB condom or USB data blocker (as shown in Figure 1) to use to block data transfer.


Figure 1


Credit: TB-CERT (Thailand Banking Sector CERT) under the Thai Bankers Association

bottom of page