One new remarkable feature of the modern laptops is the capability to power the gadget through the USB ports. This is different from the old rectangular USB port. The latest USB port can charge your laptop. Well, that’s great news for all laptop users. This means that one doesn’t have to add an extra port just for the purposes of charging the laptop.
Also, when the USB port is not being used to power the laptop, it can be used for other purposes like plugging in your phone or even a hard drive. Well, according to many tech commentators, this is a major advancement and a very great innovation. Also, the idea is a lucrative opportunity for hackers to exploit the new advancement. One technology expert, who is known as MG, managed to demonstrate how a Macbook charger could easily be booby-trapped. The modification of the machine is made in such a way that it is possible to hack into a person’s computer without the owner having an idea that something happened.
This is the kind of hacks that often make security professionals have cold chills down their spines. MacBook’s ubiquitous white, square chargers are seen in most coffee shops and offices around the globe. They are borrowed by friends, colleagues, and family. In the process, they are lost and replaced on a very regular basis. The technology expert MG disemboweled the interior of one of the MacBook charger and then occupied it with small modules. The components are then power-driven up when the unwary victim connects it to the laptop.
The process is extremely difficult for one to note. When the component is plugged in, it still charges the laptop normally. When the fake hijacking device is plugged in, it was still able to insert a fake log-in screen on the website. If MG decided to use his skills, he could have applied this criterion to scoop-up whatever information he wanted into the fake site. MG reported that in the demonstration, he was only capturing the username and password. He went on to note that the technique could also inject malware and persist types of infections that could be spiteful. What MG was doing is an early testing phase. However, he predicted that the malicious attack would work on any laptop that uses the USB-C to power the machine. He said that the port was designed and developed by Apple but could also work on Lenovo, HP, and other laptop brands.