This incredible exploit could have let hackers remotely own iPhones without even touching them

Discussion in 'Headline News' started by RickAgresta, Dec 2, 2020.

  1. RickAgresta

    RickAgresta Peanut, leader of the Peanutty Forces

    Messages:
    21,871
    Likes Received:
    19,526
    Trophy Points:
    288
    A Google Project Zero researcher found a stunning vulnerability



    Ever watch that movie, or play that video game, about the hacker who can instantly take over someone’s device without touching it at all? Those scenes are typically unrealistic as heck. But every once in a while, a real-life hack makes them seem downright plausible — a hack like the one you can see examples of in the videos above and below.





    Today, Google Project Zero security researcher Ian Beer has revealed that, until May, a variety of Apple iPhones and other iOS devices were vulnerable to an incredible exploit that could let attackers remotely reboot and take complete control of their devices from a distance — including reading emails and other messages, downloading photos, and even potentially watching and listening to you through the iPhone’s microphone and camera.

    How is such a thing even possible? Why would an iPhone even listen to a remote hacking attempt? According to Beer, that’s because today’s iPhones, iPads, Macs and Watches use a protocol called Apple Wireless Direct Link (AWDL) to create mesh networks for features like AirDrop (so you can easily beam photos and files to other iOS devices) and Sidecar (to quickly turn an iPad into a secondary screen). Not only did Beer figure out a way to exploit that, he also found a way to force AWDL to turn on even if it was left off previously.

    While Beer says he has “no evidence that these issues were exploited in the wild” and admits it took him six whole months to sniff out, verify and demonstrate this exploit — and while it’s been patched as of May — he suggests we shouldn’t take the existence of such a hack lightly:

    The takeaway from this project should not be: no one will spend six months of their life just to hack my phone, I’m fine.

    Instead, it should be: one person, working alone in their bedroom, was able to build a capability which would allow them to seriously compromise iPhone users they’d come into close contact with.

    Eerie stuff.

    Apple doesn’t dispute the exploit existed, and in fact cites Beer in the changelogs for several of its May 2020 security updates that are linked to the vulnerability. But the company does point out that most iOS users, by far, are already using newer versions of iOS that have been patched — and suggests that an attacker would have needed to be within Wi-Fi range for it to work.

    You can read Beer’s lengthy explanation of exactly how the hack worked right here.

    The Verge article link:
    https://www.theverge.com/2020/12/1/21877603/apple-iphone-remote-hack-awdl-google-project-zero
     
    scjjtt, lelisa13p, Hook and 2 others like this.
  2. lelisa13p

    lelisa13p Your Super Moderator Super Moderator

    Messages:
    23,649
    Likes Received:
    9,093
    Trophy Points:
    288
    As if we didn't have enough to fear already...
     
  3. headcronie

    headcronie Greyscale. Nuff Said. Super Moderator

    Messages:
    14,487
    Likes Received:
    6,231
    Trophy Points:
    113
    So a feature used for Apple devices to talk to each other was used and abused with full control being the result.

    Queue Amazon and its new "Sidewalk" communication protocol which aims to allow its devices to talk to each other even if not connected to wifi.

    I shut that crap down before it even launched. That's a huge nope!
     
    scjjtt, jigwashere, lelisa13p and 2 others like this.
Loading...

Share This Page