free hit counter share image
maxconsole - 1.12.2015
Visit Zevera!
nac3 nds
Apple updates iOS7 to block Fake Chargers!    

  Apple updates iOS7 to block Fake Chargers!
Added by garyopa on 2.08.2013

Trusting iPhones plugged into bogus chargers get a dose of malware

iPhones will pretty much trust any computer they're plugged into, but now the new iOS7 update will pop-up an warning screen asking if the user wishes to 'trust' this computer or not, when charging!


Like ... Dislike ..
Total Likes : 5
Total dislikes : 3

  Discuss in our forums


We reported on the 'bogus fake chargers' hack a month or so ago, on our MaxConsole Underground Forums, and now Apple has responded saying they have updated their iOS7 and the latest version being tested currently by developers will now pop-up a warning screen asking if the user should 'trust' this computer, and hopefully that will make them more aware the device they plugging into is more then just an charger.

Plugging your phone into a charger should be pretty safe to do. It should fill your phone with electricity, not malware. But researchers from Georgia Institute of Technology have produced fake chargers they've named Mactans that do more than just charge your phone: they install custom, malicious applications onto iPhones.

Their bogus chargers-which do, incidentally, charge the phone-contain small computers instead of mere transformers. The iPhone treats these computers just as it does any other computer, but instead of just charging, it responds to USB commands. It turns out that the iPhone is very trusting of USB-attached computers; as long as the iPhone is unlocked (if only for a split second) while attached to a USB host, then the host has considerable control over the iPhone.

The researchers used their USB host to install an app package onto any iPhone that gets plugged in. iOS guards against installation of arbitrary applications with a strict sandboxing system, a feature that has led to the widespread practice of jailbreaking. This attack doesn't need to jailbreak, however.

Instead, it takes advantage of the system that Apple devised to permit developers to deploy applications to their own devices for testing purposes. Deploying such applications requires the creation of a provisioning profile. A provisioning profile identifies a specific phone and a specific application, allowing the named application to run on the named device. These provisioning profiles are generated by Apple and installed over USB.

The malicious charger interrogates the attached iPhone to read its UDID, the unique ID number that identifies a particular iPhone. It then sends the UDID to Apple's Web page that generates provisioning profiles. With the provisioning profile in hand, it can deploy the provisioning profile to the phone, and then deploy the malicious app identified by the provisioning profile.

Though the malicious app is still sandboxed, it doesn't have to pass through Apple's normal application vetting process, and so it can still do plenty of useful malicious things. The demonstration showed a malicious Facebook app that replaced the real Facebook app with a trojaned version. The trojaned version could then do things like take screenshots of the iPhone whenever passwords are being entered, and simulate key presses to, for example, dial numbers without user intervention.

There are limits to this kind of attack. As well as requiring the phone's screen to be unlocked, the generation of the provisioning profile requires the attacker to have a valid developer account. Each developer account can only generate provisioning profiles for 100 different phones, and there's no facility to remove a UDID that's associated with a developer's account.

This will tend to limit the attacks to specific ones against individual users, rather than widespread, indiscriminate attacking. In principle, a Mactans charger could be made to look identical to an official Apple charger; a suitably motivated attacker could replace proper chargers with the malicious chargers to attack targets' phones.

Apple has responded to this research by making the iPhone a little less trusting. Instead of trusting any USB host that it's connected to, iOS 7 will prompt users the first time, asking if they want to trust the currently connected computer. This notification will immediately disclose that a charger isn't a charger at all, but in fact a Mactans-like device.


Get the Max out of your console


Discuss this in our forums

Click here to discuss about this news in the forums


  iphone provisioning apple malicious charger phone profile chargers usb app trust instead host applications just fake attack mactans version user  



top posts


Nintendo NX Has A ’60% Chance’ of Being Successful
Michael Pachter doesn’t seem to be giving it a great chance.
Mario takes on Minecraft Guy
In Battle of the Video Games!
RUMOR: Ace Combat 7 to be announced soon
Bandai Namco may reveal a new entry in air combat series this week, if data miners are correct.
Xbox One $150 Elite Controller is HOT Selling Item
If you find one, buy it, Phil Spencer advises.
Mario Kart 8 is coming to Disney XD
Rev up your virtual engines!


Top 5 iPad Casino Apps of 2015
Each year iPad Casino Apps are getting better so lets review the some of the ones that are available
888Sport App Destination
888sport is one of the leading names in the online betting industry.
Classic console games that have become online pokies
Street Fighter 2 / Transformers / Sensible Soccer / Tomb Raider / Double Dragon
Fable Legends with Xbox Live Gold
The 'Fable Trilogy' are games, where you can do quests and play the hero or the villain of the game.
EXCLUSIVE: Official MaxConsole Amiiqo Review
Amiibos. You've probably heard of them by now! Distributeur officiel R4i SDHC






Contact us

Advertise on

0 wallclock secs - 0.41 cpu secs