viralamo

Menu
  • Technology
  • Science
  • Money
  • Culturs
  • Trending
  • Video

Subscribe To Our Website To Receive The Last Stories

Join Us Now For Free
Home
Technology
Researchers devise iPhone malware that runs even when device is turned off
Technology

Researchers devise iPhone malware that runs even when device is turned off

16/05/2022

Researchers devise iPhone malware that runs even when device is turned off

Classen et al.

When you turn off an iPhone, it doesn’t fully power down. Chips inside the device continue to run in a low-power mode that makes it possible to locate lost or stolen devices using the Find My feature or use credit cards and car keys after the battery dies. Now researchers have devised a way to abuse this always-on mechanism to run malware that remains active even when an iPhone appears to be powered down.

It turns out that the iPhone’s Bluetooth chip—which is key to making features like Find My work—has no mechanism for digitally signing or even encrypting the firmware it runs. Academics at Germany’s Technical University of Darmstadt figured out how to exploit this lack of hardening to run malicious firmware that allows the attacker to track the phone’s location or run new features when the device is turned off.

This video provides a high overview of some of the ways an attack can work.

[Paper Teaser] Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones

The research is the first—or at least among the first—to study the risk posed by chips running in low-power mode. Not to be confused with iOS’s low-power mode for conserving battery life, the low-power mode (LPM) in this research allows chips responsible for near-field communication, ultra wideband, and Bluetooth to run in a special mode that can remain on for 24 hours after a device is turned off.

“The current LPM implementation on Apple iPhones is opaque and adds new threats,” the researchers wrote in a paper published last week. “Since LPM support is based on the iPhone’s hardware, it cannot be removed with system updates. Thus, it has a long-lasting effect on the overall iOS security model. To the best of our knowledge, we are the first who looked into undocumented LPM features introduced in iOS 15 and uncover various issues.”

Advertisement

They added: “Design of LPM features seems to be mostly driven by functionality, without considering threats outside of the intended applications. Find My after power off turns shutdown iPhones into tracking devices by design, and the implementation within the Bluetooth firmware is not secured against manipulation.”

The findings have limited real-world value since infections required a jailbroken iPhone, which in itself is a difficult task, particularly in an adversarial setting. Still, targeting the always-on feature in iOS could prove handy in post-exploit scenarios by malware such as Pegasus, the sophisticated smartphone exploit tool from Israel-based NSO Group, which governments worldwide routinely employ to spy on adversaries.
It may also be possible to infect the chips in the event hackers discover security flaws that are susceptible to over-the-air exploits similar to this one that worked against Android devices.

Besides allowing malware to run while the iPhone is turned off, exploits targeting LPM could also allow malware to operate with much more stealth since LPM allows firmware to conserve battery power. And of course, firmware infections are already extremely difficult to detect since it requires significant expertise and expensive equipment.

The researchers said Apple engineers reviewed their paper before it was published, but company representatives never provided any feedback on its contents. Apple representatives didn’t respond to an email seeking comment for this story.

Ultimately, Find My and other features enabled by LPM help provide added security because they allow users to locate lost or stolen devices and lock or unlock car doors even when batteries are depleted. But the research exposes a double-edged sword that, until now, has gone largely unnoticed.

“Hardware and software attacks similar to the ones described, have been proven practical in a real-world setting, so the topics covered in this paper are timely and practical,” John Loucaides, senior vice president of strategy at firmware security firm Eclypsium. “This is typical for every device. Manufacturers are adding features all the time and with every new feature comes a new attack surface.”

Source link

Share
Tweet
Pinterest
Linkedin
Stumble
Google+
Email
Prev Article
Next Article

Related Articles

Dexcom makes controlling blood sugar far simpler for diabetes patients — and everyone else too
If you’ve ever wondered if the data we’re amassing will …

Dexcom makes controlling blood sugar far simpler for diabetes patients — and everyone else too

Senate Judiciary committee interrogates Apple, Facebook about crypto
Enlarge / Lindsay Graham doesn’t want people reading his texts. …

Senate Judiciary committee interrogates Apple, Facebook about crypto

Leave a Reply Cancel reply

Find us on Facebook

Related Posts

  • AT&T raises DirecTV prices again despite losing millions of customers
    AT&T raises DirecTV prices again despite losing …
    10/12/2019
  • Researchers train AI to map a person’s facial movements to any target headshot
    Researchers train AI to map a person’s …
    28/11/2019
  • TechCrunch’s Favorite Things of 2019
    Jam lets you safely share streaming app …
    11/02/2020
  • Xbox Series X: How humongous is Microsoft’s next-gen console?
    Xbox Series X: How humongous is Microsoft’s …
    13/12/2019
  • Kazakhstan spies on citizens’ HTTPS traffic; browser makers fight back
    Kazakhstan spies on citizens’ HTTPS traffic; browser …
    19/12/2020

Popular Posts

  • 10 Shocking and Surprising Facts About the …
    25/06/2022 0
  • US college VPN credentials for sale on Russian crime forums, FBI says
    US college VPN credentials for sale on …
    27/05/2022 0
  • 10 Cheap Foods That Will Make You …
    28/05/2022 0
  • 10 Origin Stories of Favorite Classic Sitcoms …
    28/05/2022 0
  • Top 10 Historical Musicals That Aren’t “Hamilton” …
    29/05/2022 0

viralamo

Pages

  • Contact Us
  • Privacy Policy
Copyright © 2022 viralamo
Theme by MyThemeShop.com

Ad Blocker Detected

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

Refresh