Security researchers from the Georgia Institute of Technology are presenting a method of injecting arbitrary software into the iPhone using a malicious charger at Black Hat USA 2013.
The team says that the results of its research are alarming. "Despite the plethora of defense mechanisms in iOS, we successfully injected arbitrary software into current-generation Apple devices running the latest operating system (OS) software. All users are affected, as our approach requires neither a jailbroken device nor user interaction."
In this presentation, we demonstrate how an iOS device can be compromised within one minute of being plugged into a malicious charger. We first examine Apple’s existing security mechanisms to protect against arbitrary software installation, then describe how USB capabilities can be leveraged to bypass these defense mechanisms. To ensure persistence of the resulting infection, we show how an attacker can hide their software in the same way Apple hides its own built-in applications.
Their malicious charger has been dubbed 'Mactans' and was built using a BeagleBoard.
This hardware was selected to demonstrate the ease with which innocent-looking, malicious USB chargers can be constructed. While Mactans was built with limited amount of time and a small budget, we also briefly consider what more motivated, well-funded adversaries could accomplish.
The researchers will also present on ways that users can protect themselves from the attack and suggest security measures Apple could implement to make the attack more difficult.
Read More [via Forbes] [via Tzvi]
The team says that the results of its research are alarming. "Despite the plethora of defense mechanisms in iOS, we successfully injected arbitrary software into current-generation Apple devices running the latest operating system (OS) software. All users are affected, as our approach requires neither a jailbroken device nor user interaction."
In this presentation, we demonstrate how an iOS device can be compromised within one minute of being plugged into a malicious charger. We first examine Apple’s existing security mechanisms to protect against arbitrary software installation, then describe how USB capabilities can be leveraged to bypass these defense mechanisms. To ensure persistence of the resulting infection, we show how an attacker can hide their software in the same way Apple hides its own built-in applications.
Their malicious charger has been dubbed 'Mactans' and was built using a BeagleBoard.
This hardware was selected to demonstrate the ease with which innocent-looking, malicious USB chargers can be constructed. While Mactans was built with limited amount of time and a small budget, we also briefly consider what more motivated, well-funded adversaries could accomplish.
The researchers will also present on ways that users can protect themselves from the attack and suggest security measures Apple could implement to make the attack more difficult.
Read More [via Forbes] [via Tzvi]