free hit counter maxconsole.com share image
maxconsole
www.maxconsole.com - 27.05.2016
 
 
Visit Zevera!
HOME - FORUM - REVIEWS - $ SUBMIT NEWS $
nac3 nds
     
Apple updates iOS7 to block Fake Chargers!    

  Apple updates iOS7 to block Fake Chargers!
Added by garyopa on 2.08.2013

Trusting iPhones plugged into bogus chargers get a dose of malware

iPhones will pretty much trust any computer they're plugged into, but now the new iOS7 update will pop-up an warning screen asking if the user wishes to 'trust' this computer or not, when charging!

 

Like ... Dislike ..
Total Likes : 5
Total dislikes : 3

icon
  Discuss in our forums

line1

We reported on the 'bogus fake chargers' hack a month or so ago, on our MaxConsole Underground Forums, and now Apple has responded saying they have updated their iOS7 and the latest version being tested currently by developers will now pop-up a warning screen asking if the user should 'trust' this computer, and hopefully that will make them more aware the device they plugging into is more then just an charger.

Plugging your phone into a charger should be pretty safe to do. It should fill your phone with electricity, not malware. But researchers from Georgia Institute of Technology have produced fake chargers they've named Mactans that do more than just charge your phone: they install custom, malicious applications onto iPhones.

Their bogus chargers-which do, incidentally, charge the phone-contain small computers instead of mere transformers. The iPhone treats these computers just as it does any other computer, but instead of just charging, it responds to USB commands. It turns out that the iPhone is very trusting of USB-attached computers; as long as the iPhone is unlocked (if only for a split second) while attached to a USB host, then the host has considerable control over the iPhone.

The researchers used their USB host to install an app package onto any iPhone that gets plugged in. iOS guards against installation of arbitrary applications with a strict sandboxing system, a feature that has led to the widespread practice of jailbreaking. This attack doesn't need to jailbreak, however.

Instead, it takes advantage of the system that Apple devised to permit developers to deploy applications to their own devices for testing purposes. Deploying such applications requires the creation of a provisioning profile. A provisioning profile identifies a specific phone and a specific application, allowing the named application to run on the named device. These provisioning profiles are generated by Apple and installed over USB.

The malicious charger interrogates the attached iPhone to read its UDID, the unique ID number that identifies a particular iPhone. It then sends the UDID to Apple's Web page that generates provisioning profiles. With the provisioning profile in hand, it can deploy the provisioning profile to the phone, and then deploy the malicious app identified by the provisioning profile.

Though the malicious app is still sandboxed, it doesn't have to pass through Apple's normal application vetting process, and so it can still do plenty of useful malicious things. The demonstration showed a malicious Facebook app that replaced the real Facebook app with a trojaned version. The trojaned version could then do things like take screenshots of the iPhone whenever passwords are being entered, and simulate key presses to, for example, dial numbers without user intervention.

There are limits to this kind of attack. As well as requiring the phone's screen to be unlocked, the generation of the provisioning profile requires the attacker to have a valid developer account. Each developer account can only generate provisioning profiles for 100 different phones, and there's no facility to remove a UDID that's associated with a developer's account.

This will tend to limit the attacks to specific ones against individual users, rather than widespread, indiscriminate attacking. In principle, a Mactans charger could be made to look identical to an official Apple charger; a suitably motivated attacker could replace proper chargers with the malicious chargers to attack targets' phones.

Apple has responded to this research by making the iPhone a little less trusting. Instead of trusting any USB host that it's connected to, iOS 7 will prompt users the first time, asking if they want to trust the currently connected computer. This notification will immediately disclose that a charger isn't a charger at all, but in fact a Mactans-like device.

 




Maxconsole:
The source for Android, iOS and Windows Phone gamers

line2

text
Discuss this in our forums

Click here to discuss about this news in the forums


 

  cloud  
     
  iphone provisioning apple malicious charger phone profile chargers usb app trust instead host applications just fake attack mactans version user  

 

 
 

top posts



new

icon
TMNT: Mutants In Manhattan is officially launched!
Take on the Turtles’ Mightiest Foes in This New Four-Player Online Co-op Action Game
icon
Vernee Thor Global Review Campaign
Purchase Vernee Thor // Win $50 Cash Back // Activity Time: May 26th - June 2nd // Learn More Inside
icon
TELCLAST 2016 Mega Brand Sale
Make It Happen - Starts May 25th
icon
No Man's Sky Delayed
The ambitious space game No Man’s Sky has been delayed, two sources tell Kotaku.
icon
TomTop's Summer Promotion
Exclusive to PayPal - Summer Sale - Up To 70% OFF - Ends July 30th, 2016

review

icon
What Is Slotozilla?
We go in-depth of what makes Slotozilla, one of best video gaming online casino sites out there!
icon
NetEnt Gaming Software Review
Have you ever thought about how your favorite online casino games came into creation?
icon
Top 3 Real Money Gaming Software’s
The online gaming industry has extremely humble beginnings.
icon
Top Rated Real Money Games at Casinos
So many choices, when it comes to games to play for Real Money, look over our Review for great tips.
icon
Best Online Gaming Games for PC
The 2010's have been great for online gaming in general.

 

down1

SF

 

Contact us


Advertise on maxconsole.com





1 wallclock secs - 0.39 cpu secs