Researchers Plan To Hack An iPhone With A Malicious Charger

Researchers claim they can hack an Apple iOS device with an easy-to-make charger that they plan to show off at the BlackHat conference next month.

The Apple operating system has been almost immune to malware since it arrived in 2007, with only one piece of malicious software ever seen on iOS.

iPhone jailbreakMany have been clamouring for ways to hack iPhones and iPads, but most techniques have so far relied on jailbreaking the device.

Hacking an iPhone ‘in one minute’

However, researchers from the Georgia Institute of Technology claim in their BlackHat teaser they did not have to use a jailbreak. Instead, they have created a malicious charger, which they’ve named Mactans, using a BeagleBoard, a low-power open-source hardware single-board computer.

That would suggest Mactans is more than just an average charger. But the researchers, who haven’t revealed any more than what the preview says, noted “they wanted to demonstrate the ease with which innocent-looking, malicious USB chargers can be constructed”.

They said all users were vulnerable to attacks over the charger, which could be carried out in just one minute.

“The results were alarming: despite the plethora of defense mechanisms in iOS, we successfully injected arbitrary software into current-generation Apple devices running the latest operating system (OS) software,” the BlackHat preview read.

“In this presentation, we demonstrate how an iOS device can be compromised within one minute of being plugged into a malicious charger.

“We first examine Apple’s existing security mechanisms to protect against arbitrary software installation, then describe how USB capabilities can be leveraged to bypass these defense mechanisms.

“To ensure persistence of the resulting infection, we show how an attacker can hide their software in the same way Apple hides its own built-in applications.”

The researchers promised to “suggest security features Apple could implement to make the attacks we describe substantially more difficult to pull off”.

How well do you know Internet security? Try our quiz and find out!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

Virgin Media O2 To Invest £700m To ‘Transform’ 4G, 5G Network

Virgin Media O2 confirms it will invest £2m a day for new mobile masts, small…

2 days ago

Tesla Cybertruck Deliveries On Hold Due To Faulty Side Trim

Deliveries of Telsa's 'bulletproof' Cybertruck are reportedly on hold, amid user complaints side trims are…

2 days ago

Apple Plots Live Translation Option For AirPods – Report

New feature reportedly being developed by Apple for iOS 19, that will allow AirPods to…

2 days ago

Binance Token Rises After Trump Stake Report

Binance BNB token rises after WSJ report the Trump family is in talks to secure…

3 days ago

iRobot Admits ‘Substantial Doubt’ Over Continued Operation

After failed Amazon deal, iRobot warns there is “substantial doubt about the Company's ability to…

3 days ago

Meta’s Community Notes To Use X’s Algorithm

Community Notes testing across Facebook, Instagram and Threads to begin next week in US, using…

3 days ago