backtop


Print 15 comment(s) - last by rhangman.. on Jun 5 at 8:05 AM

Black Hat conference demonstration shows a fresh route to subverting the popular iPhone

Apple, Inc.'s (AAPL) popular smartphone, the iPhone, has had its fair share of security struggles in the past.  Researchers are preparing to unveil in a few months a new iOS exploit at the annual Black Hat security conference -- to be held Sept. 10-12 in Las Vegas, Nev.  The attack, like some past hacks, relies on flaws in transfer protocols in the joint proprietary data/charging USB connector.  The researchers give things a new twist, though, demonstrating how this can be baked into a third party microcontroller, allowing for malicious peripherals.

The physical attack was developed by a trio of security researchers at the Georgia Institute of Technology -- post-doctoral researcher Billy Lau, Ph.D candidate YeongJin Jang, and Ph.D candidate Chengyu Song.  The "alarming" the physical-type attack is described in the abstract as:

[D]espite the plethora of defense mechanisms in iOS, we successfully injected arbitrary software into current-generation Apple devices running the latest operating system (OS) software. All users are affected, as our approach requires neither a jailbroken device nor user interaction.

In this presentation, we demonstrate how an iOS device can be compromised within one minute of being plugged into a malicious charger. We first examine Apple’s existing security mechanisms to protect against arbitrary software installation, then describe how USB capabilities can be leveraged to bypass these defense mechanisms. To ensure persistence of the resulting infection, we show how an attacker can hide their software in the same way Apple hides its own built-in applications.

To demonstrate practical application of these vulnerabilities, we built a proof of concept malicious charger, called Mactans, using a BeagleBoard. This hardware was selected to demonstrate the ease with which innocent-looking, malicious USB chargers can be constructed. While Mactans was built with limited amount of time and a small budget, we also briefly consider what more motivated, well-funded adversaries could accomplish. Finally, we recommend ways in which users can protect themselves and suggest security features Apple could implement to make the attacks we describe substantially more difficult to pull off.

The researchers seem to draw the name of their malicious charger from the scientific name for the iconic Southern Black Widow spider, L. mactans.  The hack isn't very price -- the BeagleBoard used is a Texas Instruments, Inc. (TXN) development product which retails for around $45 USD.

Beagle Board
The attack uses a TI Beagle Board. [Image Source: Julien Ponge]

The last major exploit found in the USB data transfer layer involved flaws in the backup processes.  This allowed the “evasi0n” jailbreakpublished in February to jailbreak iOS devices.  Apple patched the flaw -- which could also be exploited for malicious purposes -- in the iOS 6.1.3 update that aired a month later in March.

The attack reportedly works on both the old and new style proprietary iPhone connectors, as it is firmware based.  The attackers suggest that the supporting circuitry for the attack could be hidden in an external charger or battery, giving buyers of a malicious product a nasty surprise -- a hacked iPhone.  And a more sophisticated attacker could miniaturize them into even smaller form factors like cables.

The researchers contacted Apple about their findings but were rewarded with silence, according to a Forbes report.

Apple is notorious for a belligerent stance towards security professionals and a sluggish patching pace for security flaws, with some security firms suggesting it is ten years behind Microsoft Corp. (MSFT) in terms of security.  

Sources: Black Hat conference [abstract], Forbes



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: :o
By Motoman on 6/3/2013 4:04:24 PM , Rating: 2
Looks like that particular model is somewhat problematic, based on the reviews. But cool that such things are out there.


RE: :o
By Cheesew1z69 on 6/3/2013 4:15:39 PM , Rating: 2
Here's the same one that is in the pic on here.

http://www.thinkgeek.com/product/e81a/


RE: :o
By Souka on 6/3/2013 5:38:55 PM , Rating: 2
or go the easy route with this....
http://www.amazon.com/Slim-Wall-Plate-Surge-Protec...

and it doesn't require putting in a deep wall socket to accomidate the other designs mentioned in earlier posts.


RE: :o
By Samus on 6/3/2013 9:10:24 PM , Rating: 2
I have tried a lot of these USB wall sockets. The Cooper and the Leviton are my favorites. They are both shallow transformers (so they fit in standard boxes) but the cooper has a status light and the Leviton can actually output 2A using the left (or bottom if horizontal mounted) USB port.

I had various problems with Power2U, GE and FastMac flaking out with Qi wireless chargers/my HP Touchpad charger, and the FastMac constantly shut off after an hour due to thermal throttling. All of these except the Cooper perform poorly with two devices charging simultaneously (700ma/each port.) The Leviton works OK as long as you don't have a device that pulls 2A like an iPad, charging simultaneously with another device since the total output of the transformer is 2.1A. Unfortunately there is no current adjustment, and what I had to do is plug the high-draw device into the low-output port (700mAh) and my phones which typically only draw around 1Ah into the high-power port that the instructions say is for iPad's/tablets.

Hope this helps.


"Game reviewers fought each other to write the most glowing coverage possible for the powerhouse Sony, MS systems. Reviewers flipped coins to see who would review the Nintendo Wii. The losers got stuck with the job." -- Andy Marken














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki