Charging your iPhone? You might want to stay away from third-party USB-C cables

iPhone with USB-C charging cable
(Image credit: Shutterstock)

A charging cable hack demonstrated by Jon Bruner from Lumafield, a company that offers CT scanning solutions for businesses, explained in a post on X how tiny electronic devices can be concealed within a USB-C charging cable in such a way that they're not easily detectable

While they appear normal visually, the internal electronics of the cable have been altered to include a Wi-Fi antenna and several chips stacked on top of each other in order to provide the USB-C cable with the “brains” it would require to execute malicious activities.

A USB-C cable that had been hacked in such a manner could be capable of logging keystrokes, injecting malicious code, communicating with an attacker over Wi-Fi or even giving a hacker full access to your device. Even more terrifyingly, this small computer can be turned on or off at will by the threat actor.

Bruner’s X thread shows detailed 3D CT scans of the interior of the USB-C cable and the device, showing how the USB-C cable will still function normally, both charging devices and transferring data without any errors or other issues.

The cable was provided by researcher Mike Grover, who created the O.MG cable for security purposes. However, others with the necessary skills, supplies and technical expertise could create a similar cable and leave it in a public location in order to gather information or control devices in a similar way to the juice jacking attacks we covered last year.

How to stay safe

A woman looking at a smartphone while using a laptop

(Image credit: Shutterstock)

If you want to avoid accidentally plugging your smartphone or tablet into a hacker-controlled charging cable, the easiest and smartest thing you can do is to ensure you always bring your own cable with you. USB-C cables can be very small, so doing do won't take up that much room in your bag at all.

At the same time, you want to avoid cheap, third-party cables altogether. Instead, you want to use first party cables from Apple, Samsung or other phone manufacturers whenever possible. If you do have to use a third-party cable, make sure that it's from a reputable and well-known brand like Anker or Ugreen.

Another thing to consider is that if you just want to charge your device, using a wireless charger is a great way to avoid this problem altogether. However, your devices will charge a bit slower than they would with a wired connection.

Just like with cables, you also want to avoid using open USB ports when out in public. Hackers and other cybercriminals have started weaponizing public USB charging, so plugging your phone into a USB port at an airport or elsewhere is no longer recommended. If you're already bringing a cable, you might as well bring a charger to go along with it. GaN chargers are a lot smaller than your typical phone or laptop charger plus, they can charge multiple devices simultaneously.

When it comes to security, we often think about protecting our data and passwords as well as avoiding malware but stories like this one show that you also have to practice good cyber hygiene when out in the real world too.

More from Tom's Guide

Amber Bouman
Senior Editor Security

Amber Bouman is the senior security editor at Tom's Guide where she writes about antivirus software, home security, identity theft and more. She has long had an interest in personal security, both online and off, and also has an appreciation for martial arts and edged weapons. With over two decades of experience working in tech journalism, Amber has written for a number of publications including PC World, Maximum PC, Tech Hive, and Engadget covering everything from smartphones to smart breast pumps. 

Read more
iPhone with USB-C charging cable
Apple’s proprietary USB-C controller has officially been hacked – what you need to know
Find My iPhone
Apple Find My hack turns any Bluetooth device into a secret AirTag — what we know
MacBook Pro 2023
New Mac attack is tricking users into thinking their computer is locked — how to stay safe
A hacker typing quickly on a keyboard
Hackers are posing as Apple and Google to infect Macs with malware — don’t fall for these fake browser updates
Malware
New macOS malware uses Apple's own code to quietly steal credentials and personal data — how to stay safe
iPhone 15 Pro Max shown in hand
iMessage under attack from scammers sending phishing messages — don’t fall for it
Latest in Home Security
The Silent Beacon Bluetooth panic button worn on a wrist next to a Fitbit
I tried a physical panic button for 48 hours — and this tiny device already makes me feel safer
Ring Battery Doorbell Plus
7 Ring video doorbell tips everyone needs to know
A Tesla Powerwall next to a utility meter on the exterior wall of a green house
I deal with major snowstorms every winter and these Powerwall batteries are a game changer in my home
A Ring Outdoor Cam Plus on an exterior wall
Ring's new Outdoor Cam Plus security camera offers 2K video, better night vision
EufyCam 2C Pro on desk
EufyCam 2C Pro review
An Arlo camera on a house with a Toms Guide Price Drop tag
Presidents' Day home security tech deals: I picked the 6 best starter sales from $60
Latest in News
iPhone 16 Pro vs iPhone 16 Pro Max in hand showing displays
Forget iPhone 17 — iPhone 18 could get this huge upgrade
Rendered images of rumored foldable iPhone.
Foldable iPhone report just revealed key details — here's what we know
NYTimes Connections
NYT Connections today hints and answers — Saturday, March 23 (#651)
NYT Strands on a cellphone
NYT Strands today — hints, spangram and answers for game #385 (Sunday, March 23 2025)
Nintendo Switch 2
Nintendo Switch 2 rumored specs — here’s what we know so far
iPhone 17 Pro render
iPhone 17 Pro — 7 biggest rumored upgrades