If you've not been afraid of USB before, you can start to be afraid...
The cable USB connector, called the O.MG (Offensive MG kit), creates a backdoor with shell in it.If you plug the cable into your device, you may be exposed to remote attacks via WiFi thanks to this backdoor.
Now you may have a question about how they prepare USB cables to be used in these attacks.The trick here is that the shell of the USB "A" connector is a PCB (print circuit board) that sends a payload from a USB device with a WiFi microcontroller inside the shell.(Which PCB is used is not specified in ********s)
You might think of it as Hak5's USB Rubber Ducky, but the difference between them is that this device is remotely controllable.The method you're going to do with this device will be the best way to infiltrate a system, because all you have to do is put a random USB cable on the target device.
In the years when BadUSB was released, MG was tirelessly trying to make its own harmful USB device without getting bored, and it's finally ready.One of the most important features of this device is that the standard can be applied on any USB cable.
The PCB used in the device is not from PCBs from any Chinese company.MG last month spent 300 hours and $4,000 and created their own PCBs with Bantam using a method called floodigraphy.
This cable will become able to hack any device with ESPloitV2, a USB HID keyboard emulator that provides open source WiFi control, one of the future updates.This update will add strength to the power of the device.In the video below, you can see that the cable O.MG can open a remote webpage by connecting to a Macbook device.