Categories: Technology

Your iPhone Is Vulnerable to a Malware Attack Even When It’s Off

[ad_1]

When you turn off an iPhone, it doesn’t fully power down. Chips inside the device continue to run in a low-power mode that makes it possible to locate lost or stolen devices using the Find My feature or use credit cards and car keys after the battery dies. Now researchers have devised a way to abuse this always-on mechanism to run malware that remains active even when an iPhone appears to be powered down.

It turns out that the iPhone’s Bluetooth chip—which is key to making features like Find My work—has no mechanism for digitally signing or even encrypting the firmware it runs. Academics at Germany’s Technical University of Darmstadt figured out how to exploit this lack of hardening to run malicious firmware that allows the attacker to track the phone’s location or run new features when the device is turned off.

This video provides a high overview of some of the ways an attack can work.

Content

This content can also be viewed on the site it originates from.

The research is the first—or at least among the first—to study the risk posed by chips running in low-power mode. Not to be confused with iOS’s low-power mode for conserving battery life, the low-power mode (LPM) in this research allows chips responsible for near-field communication, ultra wideband, and Bluetooth to run in a special mode that can remain on for 24 hours after a device is turned off.

“The current LPM implementation on Apple iPhones is opaque and adds new threats,” the researchers wrote in a paper published last week. “Since LPM support is based on the iPhone’s hardware, it cannot be removed with system updates. Thus, it has a long-lasting effect on the overall iOS security model. To the best of our knowledge, we are the first who looked into undocumented LPM features introduced in iOS 15 and uncover various issues.”

They added: “Design of LPM features seems to be mostly driven by functionality, without considering threats outside of the intended applications. Find My after power off turns shutdown iPhones into tracking devices by design, and the implementation within the Bluetooth firmware is not secured against manipulation.”

The findings have limited real-world value, since infections required first jailbreaking an iPhone, which in itself is a difficult task, particularly in an adversarial setting. Still, targeting the always-on feature in iOS could prove handy in post-exploit scenarios by malware such as Pegasus, the sophisticated smartphone exploit tool from Israel-based NSO Group, which governments worldwide routinely employ to spy on adversaries.

[ad_2]
Source link
Admin

Recent Posts

Demolish Kart Game Review

Beat Kart is a three-dimensional multi-player kart racing game that encourages skillful driving and strategic…

14 hours ago

Caltextrader Review – Caltextrader.com Withdrawal Issues & Recovery Solution

Are you having withdrawal issues with Caltextrader? Let Broker Complaint Alert (BCA) help you. Caltextrader.com claims…

1 day ago

Car Auction Trends

Auto public sale trends are more than record blips; they shape a market that balances…

1 day ago

What exactly Legal Bookmaker?

Legal bookies offer odds for different events, particularly sporting challenges. Bettors place their gamble with…

2 days ago

Big Coins Value

Coins have their face value, but many collectors and dealers will pay top dollar for…

4 days ago

Copart and IAAI Bid History

Copart and IAAI are two of the world's premier auto auction companies. They offer vehicles…

5 days ago