• Latest
  • Trending
Researchers devise iPhone malware that runs even when device is turned off

Researchers devise iPhone malware that runs even when device is turned off

May 17, 2022
Bolt Opens Africa Hub in Nairobi, Kenya

Bolt Opens Africa Hub in Nairobi, Kenya

July 6, 2022
Google Translate adds 10 new African languages

Google Translate adds 10 new African languages

July 6, 2022
Ericsson invites participants to its ‘Together Apart Hackathon’ in Nigeria

Ericsson invites participants to its ‘Together Apart Hackathon’ in Nigeria

July 6, 2022
Ghana GIPC And OT Sign MoU with America’s led black-owned tech business

Ghana GIPC And OT Sign MoU with America’s led black-owned tech business

July 6, 2022
Nigeria, Mozambique approve SpaceX Internet Deployment

Nigeria, Mozambique approve SpaceX Internet Deployment

July 6, 2022
IXAfrica to Build Africa’s Largest Hyperscale-Ready Datacentre in Nairobi

IXAfrica to Build Africa’s Largest Hyperscale-Ready Datacentre in Nairobi

July 6, 2022
Uganda to Launch its First Low Earth Orbit Satellite in September

Uganda to Launch its First Low Earth Orbit Satellite in September

July 6, 2022
Africa Data Centres to Build second 20MW Data Centre in Cape Town

Africa Data Centres to Build second 20MW Data Centre in Cape Town

July 6, 2022
Kingston Announces FURY Beast RGB DDR5 Memory

Kingston Announces FURY Beast RGB DDR5 Memory

July 6, 2022
Akasa Launches the DuoDock MX Dual NVMe Dock

Akasa Launches the DuoDock MX Dual NVMe Dock

July 6, 2022
Areca ARC-1686 Entry-Level NVMe Hardware RAID Adapters

Areca ARC-1686 Entry-Level NVMe Hardware RAID Adapters

July 6, 2022
TeamGroup Xtreem DDR4-4000 CL15 2x 16 GB

TeamGroup Xtreem DDR4-4000 CL15 2x 16 GB

July 6, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Wednesday, 6 July, 2022
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

Researchers devise iPhone malware that runs even when device is turned off

by ITECHNEWS
May 17, 2022
in Leading Stories, Tech
0 0
0
Researchers devise iPhone malware that runs even when device is turned off

When you turn off an iPhone, it doesn’t fully power down. Chips inside the device continue to run in a low-power mode that makes it possible to locate lost or stolen devices using the Find My feature or use credit cards and car keys after the battery dies. Now researchers have devised a way to abuse this always-on mechanism to run malware that remains active even when an iPhone appears to be powered down.

It turns out that the iPhone’s Bluetooth chip—which is key to making features like Find My work—has no mechanism for digitally signing or even encrypting the firmware it runs. Academics at Germany’s Technical University of Darmstadt figured out how to exploit this lack of hardening to run malicious firmware that allows the attacker to track the phone’s location or run new features when the device is turned off.

YOU MAY ALSO LIKE

Bolt Opens Africa Hub in Nairobi, Kenya

Google Translate adds 10 new African languages

This video provides a high overview of some of the ways an attack can work.

The research is the first—or at least among the first—to study the risk posed by chips running in low-power mode. Not to be confused with iOS’s low-power mode for conserving battery life, the low-power mode (LPM) in this research allows chips responsible for near-field communication, ultra wideband, and Bluetooth to run in a special mode that can remain on for 24 hours after a device is turned off.

“The current LPM implementation on Apple iPhones is opaque and adds new threats,” the researchers wrote in a paper published last week. “Since LPM support is based on the iPhone’s hardware, it cannot be removed with system updates. Thus, it has a long-lasting effect on the overall iOS security model. To the best of our knowledge, we are the first who looked into undocumented LPM features introduced in iOS 15 and uncover various issues.”

They added: “Design of LPM features seems to be mostly driven by functionality, without considering threats outside of the intended applications. Find My after power off turns shutdown iPhones into tracking devices by design, and the implementation within the Bluetooth firmware is not secured against manipulation.”

The findings have limited real-world value since infections required a jailbroken iPhone, which in itself is a difficult task, particularly in an adversarial setting. Still, targeting the always-on feature in iOS could prove handy in post-exploit scenarios by malware such as Pegasus, the sophisticated smartphone exploit tool from Israel-based NSO Group, which governments worldwide routinely employ to spy on adversaries.

It may also be possible to infect the chips in the event hackers discover security flaws that are susceptible to over-the-air exploits similar to this one that worked against Android devices.

Researchers devise iPhone malware that runs even when device is turned off  | Ars Technica

Besides allowing malware to run while the iPhone is turned off, exploits targeting LPM could also allow malware to operate with much more stealth since LPM allows firmware to conserve battery power. And of course, firmware infections are already extremely difficult to detect since it requires significant expertise and expensive equipment.

The researchers said Apple engineers reviewed their paper before it was published, but company representatives never provided any feedback on its contents. Apple representatives didn’t respond to an email seeking comment for this story.

Ultimately, Find My and other features enabled by LPM help provide added security because they allow users to locate lost or stolen devices and lock or unlock car doors even when batteries are depleted. But the research exposes a double-edged sword that, until now, has gone largely unnoticed.

“Hardware and software attacks similar to the ones described, have been proven practical in a real-world setting, so the topics covered in this paper are timely and practical,” John Loucaides, senior vice president of strategy at firmware security firm Eclypsium. “This is typical for every device. Manufacturers are adding features all the time and with every new feature comes a new attack surface.”

Source: Dan Goodin
Via: ars technica
Tags: Researchers devise iPhone malware that runs even when device is turned off
ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

Bolt Opens Africa Hub in Nairobi, Kenya

Bolt Opens Africa Hub in Nairobi, Kenya

July 6, 2022
Google Translate adds 10 new African languages

Google Translate adds 10 new African languages

July 6, 2022
Ericsson invites participants to its ‘Together Apart Hackathon’ in Nigeria

Ericsson invites participants to its ‘Together Apart Hackathon’ in Nigeria

July 6, 2022

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Bolt Opens Africa Hub in Nairobi, Kenya

Bolt Opens Africa Hub in Nairobi, Kenya

July 6, 2022
Google Translate adds 10 new African languages

Google Translate adds 10 new African languages

July 6, 2022

Recent News

  • Bolt Opens Africa Hub in Nairobi, Kenya July 6, 2022
  • Google Translate adds 10 new African languages July 6, 2022
  • Ericsson invites participants to its ‘Together Apart Hackathon’ in Nigeria July 6, 2022
  • Ghana GIPC And OT Sign MoU with America’s led black-owned tech business July 6, 2022
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021 iTechNewsOnline.Com - Powered by BackUpDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021 iTechNewsOnline.Com - Powered by BackUpDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version