Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
From The Floor
A Brief History of Civilian Drones
Scan of the Month
Apple AirPods Pro (2nd Generation) CT Teardown
Materials World
Apple Rethinks Paper Packaging
Design to Reality
Apple vs. Meta: Same Problem, Different Answers
The Quality Gap
Behind the Battery Report
The Quality Gap
Blind Spots in Electronics Quality
Design to Reality
Building for the Brain: Pioneering a Long-Term Neural Implant
Design to Reality
CT Teardown: AirPods Pro (3rd Generation)
Recall Radar
Defective On Arrival
The Quality Gap
Do Water Filters Actually Work?
Design to Reality
Eight Years to Redesign a Ketchup Cap
Design to Reality
Evolution of the Plastic Bottle
Recall Radar
Fall on Fire
From The Floor
Finding Lead in Stanley's Quencher
Design to Reality
Furbo and KONG: Two Ways to Give a Dog a Treat
Recall Radar
Hidden Failures of Everyday Interfaces
Design to Reality
How Does a Car Cigarette Lighter Work?
Scan of the Month
How Four Pens Solve the Same Problem
From The Floor
How Ground Truth Data Builds Trust Between OEMs and Suppliers
Design to Reality
How I Think About R&D (and Turning Ideas Into Products)
The Quality Gap
How People Drive Quality
From The Floor
How Saucony Uses CT to Build Better Running Shoes
Design to Reality
How SawStop Stops a Saw Blade in 5 Milliseconds
Materials World
How We Learned to Hold a Bit Still
Materials World
How the Wine Industry Engineered Around Cork's One Flaw
From The Floor
How to Read a Plastic Bottle
From The Floor
Inside a 12‑Month Sprint from Concept to Factory‑Ready Product
Scan of the Month
Inside the Nintendo Switch 2 Joy-Cons
From The Floor
Malicious Hardware Hidden in Plain Sight
From The Floor
Manufacturing in 2026: Less Disruption, More Discipline
Materials World
Materials That Make or Break a Shoe
Design to Reality
Not All USB-C Cables Are the Same
Design to Reality
Nothing Ear 3 Has Nothing to Hide
Recall Radar
Parts Under Pressure
Design to Reality
Pulling the Thread on Talenti’s Stubborn Lids
The Quality Gap
Reshoring's Hidden Constraint: Quality
Recall Radar
Routine Uses, Real Risks
Recall Radar
Safety Gaps That Keep Shipping
Materials World
Seashell Architecture
Materials World
Speaking in Steel and Sapphire: MING’s 20.01 Series 5
Recall Radar
Stored Energy Meets Soft Spots
From The Floor
The Missing Middle in Battery Manufacturing
Design to Reality
The Pink Tax: Are Men's and Women's Razors Actually Different?
Recall Radar
Tolerance Tested
Recall Radar
Too Hot, Too Sharp, Too Loose
Scan of the Month
We CT Scanned a Bag of Chips and 3D Printed the Results
Design to Reality
What Are Counterfeit Batteries?
The Quality Gap
What Counterfeit Apple Products Look Like on the Inside
The Quality Gap
What Food Manufacturers Can't See
Scan of the Month
What Medical Connectors Have to Get Right
Design to Reality
What QMSR Means for Medical Device Product Lifecycle Management
Materials World
What Roasting Does to a Coffee Bean, Seen From the Inside
The Quality Gap
What Went Wrong Inside These Recalled Power Banks?
Scan of the Month
What's Inside a Contactless Credit Card
Design to Reality
What's Inside the World's Fastest Marathon Shoes
The Quality Gap
What’s Hiding Inside Haribo’s Power Bank and Headphones?
Materials World
What’s Inside a Battery?
From The Floor
Your Toner Cartridge Is Lying to You
From The Floor
December 2024

Malicious Hardware Hidden in Plain Sight

In this Article:

  • CT scans of the O.MG Cable, a USB hardware implant created by security researcher Mike Grover for red team security testing, reveal a microprocessor, wireless antenna, and a secondary silicon component hidden beneath the primary chip and connected by bond wires approximately the diameter of a human hair.
  • The implant stays dormant until remotely activated, at which point it can log keystrokes, inject payloads, or establish an encrypted tunnel to a remote operator, while appearing to any log as a standard USB 2.0 device transferring data at 480 Mbps.
  • The secondary chip bonded to the underside of the primary processor is invisible to 2D X-ray inspection and would not be detectable by any method that cannot volumetrically resolve the internal structure of the connector housing, which is precisely the design intent.
12.2.2024

A USB cable is one of the most trusted objects in a workplace. It sits on desks, gets borrowed between colleagues, travels in laptop bags. Nobody thinks twice about plugging one in. That trust is exactly what the O.MG Cable is designed to exploit.

Security researcher Mike Grover, known in the hardware security community as MG, spent years miniaturizing a complete attack platform into a cable that is physically indistinguishable from a standard USB cable. The implant stays dormant until activated remotely. When it is active, it can log keystrokes, inject payloads, or establish a bidirectional tunnel to a remote operator. The cable behaves as a normal USB 2.0 device in the meantime: 5V charging, 480 Mbps data transfer, nothing unusual on any log. The hardware doing all of that fits inside the connector housing at the end of the cable.

We scanned one to see how.

What the scan shows

The CT scan reveals a microprocessor and antenna packed into the USB connector housing with almost no wasted space. The precision of the layout is immediately apparent. This is not a crude modification; the internal components are arranged with the same care you would expect from a consumer electronics manufacturer, because that is the only way to make the implant fit and still have the cable pass visual and functional inspection.

The more revealing detail, and the one MG pointed out when we showed him the scan, is a secondary silicon component bonded to the underside of the primary processor. It is easy to miss. The two chips read as a single assembly at first glance, and the bond wires connecting them are approximately the diameter of a human hair. Those wires carry signals that would be invisible to any inspection method that cannot volumetrically resolve the internal structure of the connector. A 2D X-ray looking down at the assembly might show component outlines. It would not show this.

The O.MG Cable is sold commercially for red team security testing, the legitimate practice of simulating adversary attacks against an organization's own infrastructure. Grover's stated goal is to demonstrate that hardware implants of this sophistication are possible and to give security teams a tool for testing their own detection capabilities. The cable currently sells for a fraction of what intelligence-grade equivalents cost: the NSA's COTTONMOUTH-I, a hardware implant with comparable functionality, was reported to cost $20,000 per unit.

What it means for supply chain inspection

The O.MG Cable is useful as a security research tool precisely because it makes the threat concrete. A cable like this can be introduced into a supply chain, left in a conference room, or handed to a target as a gift. Once it is plugged in, software-based security measures offer limited protection. The attack surface is below the operating system.

Hidden elements of malicious hardware such as the O.MG Cable escape the scrutiny of most inspection tools, but industrial CT yields comprehensive volumetric data that can help stop threats in their tracks.

CT scanning does not solve this problem at scale. A Neptune scan takes time and requires someone to specifically decide to inspect a cable. But for high-security environments where hardware provenance matters, and where the cost of a compromised device is measured in breached infrastructure rather than a returned product, it is the only inspection method that can confirm what is actually inside. The scan cannot tell you the cable is safe. It can tell you whether the cable contains what a cable is supposed to contain.

Citations
No items found.