News | HiddenRefer

Navigation

  • Home
  • Cloud
  • Crime
  • Cyber
  • Data Breaches
  • Drug Raids
  • Privacy
  • Security
Subscribe
News | HiddenRefer

The Best Curated Freebies in One Place

0
0
0
0
News | HiddenRefer
  • Home
  • Cloud
  • Crime
  • Cyber
  • Data Breaches
  • Drug Raids
  • Privacy
  • Security
  • Security

Researchers Find Potential Way to Run Malware on iPhone Even When it’s OFF

  • May 16, 2022
  • hiddenrefer
Malware
Total
0
Shares
0
0
0
Advertisements

A first-of-its-kind security analysis of iOS Find My function has identified a novel attack surface that makes it possible to tamper with the firmware and load malware onto a Bluetooth chip that’s executed while an iPhone is “off.”

The mechanism takes advantage of the fact that wireless chips related to Bluetooth, Near-field communication (NFC), and ultra-wideband (UWB) continue to operate while iOS is shut down when entering a “power reserve” Low Power Mode (LPM).

While this is done so as to enable features like Find My and facilitate Express Card transactions, all the three wireless chips have direct access to the secure element, academics from the Secure Mobile Networking Lab (SEEMOO) at the Technical University of Darmstadt said in a paper.

“The Bluetooth and UWB chips are hardwired to the Secure Element (SE) in the NFC chip, storing secrets that should be available in LPM,” the researchers said.

“Since LPM support is implemented in hardware, it cannot be removed by changing software components. As a result, on modern iPhones, wireless chips can no longer be trusted to be turned off after shutdown. This poses a new threat model.”

The findings are set to be presented at the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2022) this week.

The LPM features, newly introduced last year with iOS 15, make it possible to track lost devices using the Find My network even when run out of battery power or have been shut off. Current devices with Ultra-wideband support include iPhone 11, iPhone 12, and iPhone 13.

A message displayed when turning off iPhones reads thus: “iPhone remains findable after power off. Find My helps you locate this iPhone when it is lost or stolen, even when it is in power reserve mode or when powered off.”

Malware

Calling the current LPM implementation “opaque,” the researchers not only sometimes observed failures when initializing Find My advertisements during power off, effectively contradicting the aforementioned message, they also found that the Bluetooth firmware is neither signed nor encrypted.

By taking advantage of this loophole, an adversary with privileged access can create malware that’s capable of being executed on an iPhone Bluetooth chip even when it’s powered off.

However, for such a firmware compromise to happen, the attacker must be able to communicate to the firmware via the operating system, modify the firmware image, or gain code execution on an LPM-enabled chip over-the-air by exploiting flaws such as BrakTooth.

CyberSecurity

Put differently, the idea is to alter the LPM application thread to embed malware, such as those that could alert the malicious actor of a victim’s Find My Bluetooth broadcasts, enabling the threat actor to keep remote tabs on the target.

“Instead of changing existing functionality, they could also add completely new features,” SEEMOO researchers pointed out, adding they responsibly disclosed all the issues to Apple, but that the tech giant “had no feedback.”

With LPM-related features taking a more stealthier approach to carrying out its intended use cases, SEEMOO called on Apple to include a hardware-based switch to disconnect the battery so as to alleviate any surveillance concerns that could arise out of firmware-level attacks.

“Since LPM support is based on the iPhone’s hardware, it cannot be removed with system updates,” the researchers said. “Thus, it has a long-lasting effect on the overall iOS security model.”

“Design of LPM features seems to be mostly driven by functionality, without considering threats outside of the intended applications. Find My after power off turns shutdown iPhones into tracking devices by design, and the implementation within the Bluetooth firmware is not secured against manipulation.”



Total
0
Shares
Share 0
Tweet 0
Pin it 0
hiddenrefer

Previous Article
life after rehab
  • Drug Raids

Enjoying Life After Rehab | Washington Addiction Rehab Center

  • May 16, 2022
  • hiddenrefer
View & Download
Next Article
Buffalo Resident after Tops Grocery Store attack: “Something has to change…If more people were armed”
  • Crime News

Buffalo Resident after Tops Grocery Store attack: “Something has to change…If more people were armed”

  • May 16, 2022
  • hiddenrefer
View & Download
You May Also Like
Learn NIST Inside Out With 21 Hours of Training @ 86% OFF
View & Download
  • Security

Learn NIST Inside Out With 21 Hours of Training @ 86% OFF

  • hiddenrefer
  • June 25, 2022
ToddyCat claws at Asian governments
View & Download
  • Security

ToddyCat claws at Asian governments

  • hiddenrefer
  • June 24, 2022
Mitel VoIP Zero-Day
View & Download
  • Security

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

  • hiddenrefer
  • June 24, 2022
Hacking Smartphones with Hermit Spyware
View & Download
  • Security

Google Says ISPs Helped Attackers Infect Targeted Smartphones with Hermit Spyware

  • hiddenrefer
  • June 24, 2022
Backdoored Python Libraries
View & Download
  • Security

Multiple Backdoored Python Libraries Caught Stealing AWS Secrets and Keys

  • hiddenrefer
  • June 24, 2022
Ransomware as a Decoy for Cyber Espionage Attacks
View & Download
  • Security

State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks

  • hiddenrefer
  • June 24, 2022
New 'Quantum' Builder Lets Attackers Easily Create Malicious Windows Shortcuts
View & Download
  • Security

New ‘Quantum’ Builder Lets Attackers Easily Create Malicious Windows Shortcuts

  • hiddenrefer
  • June 24, 2022
Log4Shell Still Being Exploited to Hack VMWare Servers to Exfiltrate Sensitive Data
View & Download
  • Security

Log4Shell Still Being Exploited to Hack VMWare Servers to Exfiltrate Sensitive Data

  • hiddenrefer
  • June 24, 2022
  • NYPD reports slashed in the face on subway near Wall Street station
    NYPD reports slashed in the face on subway near Wall Street station
    • June 26, 2022
  • Man pushed onto NYC subway tracks after trying to break up fight
    Man pushed onto NYC subway tracks after trying to break up fight
    • June 26, 2022
  • Fire in Jurupa Valley prompts mandatory evacuations
    Fire in Jurupa Valley prompts mandatory evacuations
    • June 26, 2022
  • Man injured in shooting on BART train in Oakland
    Man injured in shooting on BART train in Oakland
    • June 26, 2022
  • Bodies of victims in NYC triple homicide decomposed
    Bodies of victims in NYC triple homicide decomposed
    • June 25, 2022

Featured Categories

Cloud Security
248 Posts
View Posts
Crime News
3834 Posts
View Posts
Cybersecurity
234 Posts
View Posts
Data Breaches
82 Posts
View Posts
Drug Raids
137 Posts
View Posts
Privacy
101 Posts
View Posts
Security
1180 Posts
View Posts
about
Navigation
  • Home
  • Cloud
  • Crime
  • Cyber
  • Data Breaches
  • Drug Raids
  • Privacy
  • Security
Featured
  • NYPD reports slashed in the face on subway near Wall Street station
    NYPD reports slashed in the face on subway near Wall Street station
    • June 26, 2022
  • Man pushed onto NYC subway tracks after trying to break up fight
    Man pushed onto NYC subway tracks after trying to break up fight
    • June 26, 2022
  • Fire in Jurupa Valley prompts mandatory evacuations
    Fire in Jurupa Valley prompts mandatory evacuations
    • June 26, 2022
  • Man injured in shooting on BART train in Oakland
    Man injured in shooting on BART train in Oakland
    • June 26, 2022
  • Bodies of victims in NYC triple homicide decomposed
    Bodies of victims in NYC triple homicide decomposed
    • June 25, 2022
News | HiddenRefer
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Input your search keywords and press Enter.