Hackers Install Malware on iPhone With Malicious Charger
June 3, 2013 3:36 PM
Black Hat conference demonstration shows a fresh route to subverting the popular iPhone
Apple, Inc.'s (
) popular smartphone, the iPhone, has had its
fair share of security struggles in the past
. Researchers are preparing to unveil in a few months a new iOS exploit at the annual
Black Hat security conference
-- to be held Sept. 10-12 in Las Vegas, Nev. The attack, like some past hacks, relies on flaws in transfer protocols in the joint proprietary data/charging USB connector. The researchers give things a new twist, though, demonstrating how this can be baked into a third party microcontroller, allowing for malicious peripherals.
The physical attack was developed by a trio of security researchers at the
Georgia Institute of Technology
-- post-doctoral researcher
, Ph.D candidate
, and Ph.D candidate
. The "alarming" the physical-type attack is described in
[D]espite the plethora of defense mechanisms in iOS, we successfully injected arbitrary software into current-generation Apple devices running the latest operating system (OS) software. All users are affected, as our approach requires neither a jailbroken device nor user interaction.
In this presentation, we demonstrate how an iOS device can be compromised within one minute of being plugged into a malicious charger. We first examine Apple’s existing security mechanisms to protect against arbitrary software installation, then describe how USB capabilities can be leveraged to bypass these defense mechanisms. To ensure persistence of the resulting infection, we show how an attacker can hide their software in the same way Apple hides its own built-in applications.
To demonstrate practical application of these vulnerabilities, we built a proof of concept malicious charger, called Mactans, using a BeagleBoard. This hardware was selected to demonstrate the ease with which innocent-looking, malicious USB chargers can be constructed. While Mactans was built with limited amount of time and a small budget, we also briefly consider what more motivated, well-funded adversaries could accomplish. Finally, we recommend ways in which users can protect themselves and suggest security features Apple could implement to make the attacks we describe substantially more difficult to pull off.
The researchers seem to draw the name of their malicious charger from the scientific name for the iconic Southern Black Widow spider,
. The hack isn't very price -- the BeagleBoard used is a Texas Instruments, Inc. (
) development product which retails for around $45 USD.
The attack uses a TI Beagle Board. [Image Source: Julien Ponge]
The last major exploit found in the USB data transfer layer involved flaws in the backup processes. This allowed the
published in February
to jailbreak iOS devices. Apple patched the flaw -- which could also be exploited for malicious purposes --
in the iOS 6.1.3 update
that aired a month later in March.
The attack reportedly works on both the old and new style proprietary iPhone connectors, as it is firmware based. The attackers suggest that the supporting circuitry for the attack could be hidden in an external charger or battery, giving buyers of a malicious product a nasty surprise -- a hacked iPhone. And a more sophisticated attacker could miniaturize them into even smaller form factors like cables.
The researchers contacted Apple about their findings but were rewarded with silence,
Apple is notorious for a
belligerent stance towards security professionals
sluggish patching pace
for security flaws
, with some security firms suggesting it is
ten years behind Microsoft
) in terms of security.
Black Hat conference [abstract]
"Death Is Very Likely The Single Best Invention Of Life" -- Steve Jobs
Apple iOS 6.1.3 Update Will Terminate Evasi0n Jailbreak
February 26, 2013, 10:23 AM
Evasi0n iOS 6.x Jailbreak Downloaded 800,000 Times in First 6 Hours
February 5, 2013, 5:49 PM
Quick Note: Untethered Jailbreak for iOS 6.x Released
February 4, 2013, 2:23 PM
Apple Takes 3 Months But Finally Stops Printing Passwords in Plaintext
May 9, 2012, 5:20 PM
Kaspersky Labs: Apple's Security 10 Years Behind Microsoft
April 26, 2012, 7:39 AM
Best Secure Android Mobile Browsers:
December 5, 2016, 7:24 PM
Latest News, this is how the Moto X (2017) might look
December 3, 2016, 9:02 AM
Fake Apple Chargers Fail Safety Tests
December 2, 2016, 5:00 AM
FlowMotion veils its new smartphone stabilizer, FlowMotion One
December 1, 2016, 3:00 AM
Samsung Galaxy C7 Pro smartphone surfaces online.
November 30, 2016, 1:00 AM
Best Phones of 2016 - Priced under $650.00
November 27, 2016, 5:00 AM
Most Popular Articles
What Can You Do with Your New Echo Dot?
December 3, 2016, 5:00 AM
Sales Battle - Apple iPad Mini vs Samsung Galaxy Tab
November 29, 2016, 12:36 AM
Google Wi-Fi – A Scalable Wi-Fi Solution for any size Home or Apartment
November 30, 2016, 1:00 AM
PIQ ROBOTTM reveals its new artificial intelligence software
November 29, 2016, 12:59 AM
PlayStation 4 Pro – 4K Console for 4K TVs
November 28, 2016, 1:00 AM
Latest Blog Posts
e Guide: Mobile Security for 2017
Dec 6, 2016, 5:00 AM
Apple Car is Not Dead
Dec 5, 2016, 1:00 AM
Dec 4, 2016, 5:00 AM
Dec 3, 2016, 5:00 AM
Dec 2, 2016, 5:00 AM
Surface Ergonomic Keyboard
Dec 1, 2016, 3:01 AM
Chapeconense plane crash: Football rallies around Brazilian Team
Nov 30, 2016, 1:00 AM
How to Extends Your iPhone’s Battery Life
Nov 29, 2016, 12:49 AM
Nov 28, 2016, 1:12 AM
News: Fidel Castro
Nov 27, 2016, 5:00 AM
Nov 26, 2016, 5:00 AM
Changes in Social status affect the way genes turn on and off within immune cells.
Nov 25, 2016, 5:12 AM
Austrian far–right hopeful Hofer may back EU vote.
Nov 24, 2016, 4:00 AM
Final Fantasy XV Leaked Before Nov 29 Launch Date
Nov 23, 2016, 1:00 AM
Nov 22, 2016, 2:26 AM
Nov 21, 2016, 1:00 AM
HTC Makes Big Moves in China
Nov 20, 2016, 2:00 AM
Do you know who is the number one company in the word?
Nov 19, 2016, 5:30 AM
Foldable Cardboard ”EcoHelmet” wins James Dyson Award’s Top Prize
Nov 18, 2016, 2:39 AM
Scientists Discover Roundest Object Ever Spotted in Universe
Nov 17, 2016, 1:00 AM
More Blog Posts
Copyright 2016 DailyTech LLC. -
Terms, Conditions & Privacy Information