London Daily

Focus on the big picture.

Google engineer demonstrate how he could get full control and copy all data from 25 iPhones without touching them

iPhone security? Hmmm... In this demo I remotely trigger an unauthenticated kernel memory corruption vulnerability which causes all iOS devices in radio-proximity to reboot, with no user interaction. Over the next 30'000 words I'll cover the entire process to go from this basic demo to successfully exploiting this vulnerability in order to run arbitrary code on any nearby iOS device and steal all the user data

One of the geniuses working for Google on Project Zero wrote on his blogpost and on his YouTube videos:

Introduction
Quoting @halvarflake's Offensivecon keynote from February 2020:

"Exploits are the closest thing to "magic spells" we experience in the real world: Construct the right incantation, gain remote control over device."

For 6 months of 2020, while locked down in the corner of my bedroom surrounded by my lovely, screaming children, I've been working on a magic spell of my own. No, sadly not an incantation to convince the kids to sleep in until 9am every morning, but instead a wormable radio-proximity exploit which allows me to gain complete control over any iPhone in my vicinity. View all the photos, read all the email, copy all the private messages and monitor everything which happens on there in real-time.

The takeaway from this project should not be: no one will spend six months of their life just to hack my phone, I'm fine.

Instead, it should be: one person, working alone in their bedroom, was able to build a capability which would allow them to seriously compromise iPhone users they'd come into close contact with.

Imagine the sense of power an attacker with such a capability must feel. As we all pour more and more of our souls into these devices, an attacker can gain a treasure trove of information on an unsuspecting target.

What's more, with directional antennas, higher transmission powers and sensitive receivers the range of such attacks can be considerable.

I have no evidence that these issues were exploited in the wild; I found them myself through manual reverse engineering. But we do know that exploit vendors seemed to take notice of these fixes. For example, take this tweet from Mark Dowd, the co-founder of Azimuth Security, an Australian "market-leading information security business":

Watch the videos and read his full post here.

Newsletter

Related Articles

London Daily
0:00
0:00
Close
London Daily Morning Headlines - Wednesday, May 1 2024
Amazon Cloud Sales Growth Accelerates
Apple Recruits Google Staff for AI Development
Changpeng Zhao Sentenced to Four Months in Jail
S&P 500 Experiences Worst Month Pre-Fed Announcement
Columbia University's Hard Line on Student Protests
Biden Administration to Relax Marijuana Regulations
Netanyahu's Firm Stance Amid Rafah Hostage Talks
BlackRock to Establish Saudi Investment Firm
UK Food Delivery Firms to Check Riders' Immigration Status
Elon Musk Disbands Tesla’s Supercharger Team
Major Changes at Manchester United Under Ratcliffe
Rap Lyrics as Trial Evidence in England and Wales
Rap Lyrics as Trial Evidence in England and Wales
Monty Panesar to Stand for George Galloway's Party
Sadiq Khan Leads in London Mayoral Polls
UK Tory Chair on Party Funding
Brexit Checks to Increase Food Import Costs
Legal Challenge to Cuts in England’s Cycling and Walking Budget
Rising Homelessness in England
Potential Criminalization of Lying by Politicians in Wales
MPs Advocate for Work Rights for Asylum Seekers
Home Office Loses Track of Rwanda Deportees
Historic Memo Challenges Current UK Insurance Policy
London Daily's Video newsletter
Labour Axes 'Levelling Up' Phrase
UK Sanctions Ineffective Against Russian Economy
Humza Yousaf Resigns as Scotland’s First Minister
UK Plans Cuts to Disability Benefits
UK House Sales Increase by 12% in April
FT and OpenAI Form Content Licensing Partnership
Local Elections to Set Tone for UK National Elections
Northern Ireland’s Troubles: New Legislation Faces Backlash
Dubai's New Al Maktoum International Airport: World's Largest with ₹2900 Crores Investment, 5 Runways, and 260 Million Annual Capacity
101-Year-Old Woman Mistaken for a Baby by American Airlines: Comical Mix-Up during Flight Check-in
New UK Laws: Banning Weak Passwords for Internet-Connected Devices to Enhance Cybersecurity
A British MP who visited Djibouti (Africa) was expelled there due to Chinese sanctions
Blinken on Gaza: Ceasefire is Key to Humanitarian Crisis Resolution
Spanish Prime Minister May Announce Resignation
AI Revolution: Tech Giants Lead the Way
Retail Restructuring: Major Job Cuts at France's Casino
Energy Sector Turbulence: TotalEnergies' Earnings Dip
Mining Giant Standoff: Anglo American vs BHP
Art and Equality: Sultan Sooud Al Qassemi's Cultural Impact
France Simplifies: Cutting Business Bureaucracy
European Defense Unity: France and Germany's New Deal
Pharma Boom: AstraZeneca's Revenue Surge
Political Shifts: Tory MP Joins Labour
Labour Party Conference: Tickets Sell Out Fast
Scottish Politics: First Minister's Confidence Battle
×