Apple's 'walled garden' cracked by hacked charger

Storming a castle's walls isn't always the best way to bring them down. Sometimes less direct siege methods work better, as a trio of researchers discovered when launching an attack on the walled garden Apple's built around its iPhone.

The Georgia Tech researchers demonstrated at the Black Hat security conference in Las Vegas this week a method for using a home-brewed charger to substitute an infected version of Facebook's iPhone app for the legitimate software with no one being the wiser.

For Apple, the demo is the second time in recent weeks that cracks have begun to show in the company's "walled garden" around its mobile ecosystem. A week ago, a website the company runs for its developers was penetrated by a Turkish security researcher and some 100,000 member records removed from the site.

"A walled garden is just that: a wall," Tom Kellermann, vice president of cyber security for Trend Micro, said via email. "The method employed demonstrates a technique to tunnel under that wall."

[See also: Apple, Samsung phone security features to be scrutinized]

Because the vulnerability discovered by the researchers involves a hardware flaw, it could present a difficult security challenge for Apple, Kellermann said. But since the tactic only works on a one-to-one basis, the attack isn't very scalable.

"Apple's greatest vulnerability still lies in attacks targeting apps and websites running in Safari," Kellermann added.

Choosing Apple, considered a very secure ecosystem, as a target for their demonstration made the attack more fascinating, said Alex Watson, director of security research at Websense.

The level of detail in the demo also impressed Watson. "It wasn't just a proof of concept saying, 'This is possible,'" he said in an interview. "They were able to very surreptitiously delete a Facebook application and put a compromised Facebook application in the exact same spot on the screen where the previous one existed.

"It shows a very convincing and very repeatable attack that would very hard to detect," he added.

To attack an iPhone 5, the researchers -- Billy Lau and graduate students Yeongjin Jang and Chengyu Song -- built a bogus charger based on a $45 single-board computer called a BeagleBoard. The box -- dubbed Mactan, the scientific name for the Black Widow spider -- exploits code in the operating system that allows anyone with a developer's license to install custom software on the handset.

Once connected to the phone, Mactan reads the handset's Unique Device Identifier, registers it as a developer's test device and then uses those privileges to install malware.

The compromised Facebook app contained a Trojan that could capture screenshots and button touches and send them to a server connected to the Internet.

The researchers were not immediately available for comment.

Apple did not respond to a request for comment on the hack, but it has reportedly moved to address the problem. The issue has already been addressed in the latest beta of iOS 7, the next version of Apple's mobile operating system expected to be finalized this fall, Reuters reported.

"The good news is that the researchers informed Apple and iOS 7 will have protection in place against this vulnerability," security analyst Graham Cluley said by email. "What isn't clear at this stage is whether Apple is also going to roll out a security update for earlier versions of iOS."

Pending the release of a patch, he said, iPhone owners should be charging their iOS devices only from an electrical socket in the wall or by plugging it into their own computers.

Since the researchers' exploit only works on an unlocked iPhone, it's also wise for users to lock their phones and secure them with a strong password.

Nevertheless, depending on how Apple chooses to patch the flaw, it could be exploited in the future. "If Apple only patches iOS 7 and leaves other devices unprotected, then there may well be targeted attacks against specific individuals using this method," Cluley said.

Read more about wireless/mobile security in CSOonline's Wireless/Mobile Security section.

Join the CSO newsletter!

Error: Please check your email address.

Tags applicationsmobile securityGeorgia TechsoftwareData Protection | Wirelessdata protectioniPhone chargerFacebookblackhatAppletrend microsecurity

More about AppleFacebookReuters AustraliaSamsungTrend Micro AustraliaWebsense

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by John P. Mello Jr.

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place