Google Uncovers iPhone Exploit That Can Steal Data Over Wi-Fi

Apple liked to talk a big game when it comes to security on the iPhone, but it’s as vulnerable as any other company to unforeseen bugs. Sometimes, these bugs are minor and easy to fix with public disclosure. Other times, the bugs are a threat to user data and need to be patched in secret. That’s the case for a recent update that fixed a major Wi-Fi exploit. According to Ian Beer of Google’s Project Zero security team, the flaw allowed him to steal photos from any iPhone just by pointing a Wi-Fi antenna at it. ,According to Beer, he discovered the flaw earlier this year and spent six months developing an exploit around it. The attack uses a buffer overflow bug in AWDL, which is Apple’s custom mesh networking protocol that allows iPhones, iPads, Apple Watches, and Macs to form ad-hoc wireless connections. This is a core part of the iOS and macOS software stack, so exploiting it gave Beer access to all the phone’s data. ,Beer posted a full rundown of the hack on the Project Zero blog, which he can do because the flaw was reported to Apple early in 2020, allowing the iPhone maker to roll out patches in May to block the attack. The write up is exhaustively detailed, clocking in at 30,000 words. There’s also a video demo below, which won’t take quite so long to digest. ,The attack utilizes a Raspberry Pi and off-the-shelf Wi-Fi adapters. It took some time to find the right combination of hardware. Beer notes we wanted to send poisoned AWDL packets over common 5GHz Wi-Fi channels, and not all antennas would allow him to do that. He also had to create a network stack driver that could interface with Apple’s software, and then learn how to turn the core buffer overflow bug into a “controllable heap corruption.” That’s what gave him control of the device. ,As you can see in the video, the entire thing happens remotely without any interaction from the user. It takes a few minutes to break into the phone, but he’s able to successfully retrieve a photo from the device. Depending on the strength of the Wi-Fi antenna, Beer says this same attack could work from a great distance. ,It might be tempting to say any attack that takes six months to develop and 30,000 words to fully explain is not a real threat, but Beer points out he did this,. If a single engineer can create an exploit in six months that compromises sensitive data on a,phones, that is a problem. Thankfully, this bug is fixed. It’s the next one we have to worry about.,It might be tempting to say any attack that takes six months to develop and 30,000 words to fully explain is not a real threat, but Beer points out he did this,,

Leave a Reply

Your email address will not be published. Required fields are marked *

Related

MOBILE

Samsung Will Reveal S21 Family at Unpacked on January 14

The event will begin at 10 AM Eastern on January 14, streamed live on YouTube. We’re expecting three phones: the Galaxy S21 (6.3-inch), S21+ (6.7-inch), and S21 Ultra (6.8-inch). Several notable details and renderings have leaked already, so we know the S21 Ultra will include an upgraded camera array compared with the base and plus […]

Read More
MOBILE

Stadia Is Now Playable on iPhone Thanks to Google’s New Web App

Google launched Stadia just over one year ago with support for select Android phones and the Chromecast. Google promised iPhone support, but Apple’s App Store policies got in the way. Now, there’s finally a way to play Stadia on iOS — just fire up Safari and go to the Stadia site to use the new […]

Read More
MOBILE

Microsoft Promises Big Improvements for the Surface Duo in 2021

Microsoft has made phones in the past, but they all ran the now-defunct Windows Mobile or Windows Phone OS. The Surface Duo, which launched last summer, is Microsoft’s first Android phone. The $1,400 dual-screen device hasn’t been in the news much since its release, but now Microsoft is promising a big year ahead for the […]

Read More