4

Researchers claim malware can be loaded onto iPhones that have been powered down...

 1 year ago
source link: https://www.techspot.com/news/94611-researchers-claim-malware-can-loaded-onto-iphones-have.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Researchers claim malware can be loaded onto iPhones that have been powered down

Reason for concern or just a nothingburger?

By Shawn Knight May 16, 2022, 3:42 PM 7 comments
Researchers claim malware can be loaded onto iPhones that have been powered down

The big picture: Researchers from the Technical University of Darmstadt in Germany have demonstrated the possibility to load malware onto an iPhone even when it is powered off. There's no evidence that it has been exploited in the wild and it may not even be viable on its own, but the matter could give Apple something to think about.

The exploit is related to a feature in iOS 15 that allows Find My to work for several hours after a device has been turned off. Specifically, chips used for Bluetooth, near field communication (NFC) and ultra-wideband (UWB) continue to run in a low-power mode (LPM) even after a user-initiated shutdown.

This low-power mode is different from the one indicated by the yellow battery icon.

In assessing LPM features, researchers found that the Bluetooth LPM firmware is neither signed nor encrypted. Under the right circumstances, the team claims this firmware could be modified to run malware. These favorable conditions include a jailbroken iPhone, preferably with system-level access. If you already have that level of access, a Bluetooth chip exploit like the one proposed here would probably be redundant.

2022-05-16-image-21.jpg

The researchers claim they informed Apple of the issues but the company did not comment on the matter. Similarly, Apple declined to comment when contacted by Motherboard.

Security researcher Ryan Duff told Motherboard "it's not really a standalone attack without additional vulnerabilities and exploits."

"It may be possible to exploit the Bluetooth chip directly and modify the firmware but the researchers did not do that and there isn't a known exploit that would currently allow that," Duff added.

In their report published on arXiv, the team said they believe LPM is "a relevant attack surface that has to be considered by high-value targets such as journalists, or that can be weaponized to build wireless malware operating on shutdown iPhones."

Image credit: Caleb Oquendo, MacRumors


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK